[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISF Dumps with VCE and PDF 161-170

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISF.html

GIAC Information Security Fundamentals

Question No: 161 – (Topic 2)

You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Use SQL Profiler

  2. Use CLR Profiler

  3. Use Windows System Monitor

  4. Use Microsoft Operations Manager

Answer: A,C,D

Question No: 162 – (Topic 2)

Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.

  1. Internet bots

  2. Spyware

  3. Scripts

  4. Anti-virus software

Answer: A,C

Question No: 163 – (Topic 2)

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project?

Each correct answer represents a complete solution. Choose all that apply.

  1. It provides the risk analysis of project configurations.

  2. It provides object, orient, decide and act strategy.

  3. It provides the versions for network devices.

  4. It provides a live documentation of the project.

Answer: C,D

Question No: 164 – (Topic 2)

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.

Which of the following attacking methods can he use to send the dangerous software protocols?

  1. HTTP tunneling

  2. URL obfuscation

  3. Banner grabbing

  4. MAC spoofing

Answer: A

Question No: 165 – (Topic 2)

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user#39;s data?

  1. Malware protection

  2. Automatic updating

  3. Firewall

  4. Other security settings

Answer: C

Question No: 166 – (Topic 2)

Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?

  1. Block cipher

  2. Transposition cipher

  3. Vigen re cipher

  4. Stream cipher

Answer: C

Question No: 167 – (Topic 2)

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company#39;s network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

  1. Antivirus software is running on the computer.

  2. You have provided an improper product key.

  3. The computer is running a driver that is incompatible with Vista.

  4. The computer has a hardware device that is incompatible with Vista.

Answer: A

Question No: 168 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

  1. PsList

  2. Fpipe

  3. Cain

  4. PsExec

Answer: B

Question No: 169 – (Topic 2)

You are the project manager of a new project to install new hardware for your organization#39;s computer network. You have never worked with networking software or hardware before so you enroll in a class to learn more about the technology you#39;ll be managing in your project. This is an example of which one of the following?

  1. Cost of nonconformance to quality

  2. Enhancing your personal professional competence

  3. Team development

  4. A waste for the project as the project manager does not need to know much about the project#39;s application

Answer: B

Question No: 170 – (Topic 2)

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message. Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

  1. Authentication

  2. Non-repudiation

  3. Data availability

  4. Confidentiality

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GISF Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISF Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.