[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISF Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISF.html

GIAC Information Security Fundamentals

Question No: 171 – (Topic 2)

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?

  1. MD5

  2. DES

  3. Symmetric Encryption

  4. Asymmetric Encryption

Answer: D

Question No: 172 – (Topic 2)

Your corporate network uses a Proxy Server for Internet access. The Manufacturing group has access permission for WWW protocol in the Web Proxy service, and access permission for POP3 protocol, in the WinSock Proxy service. The Supervisors group has access permission for WWW and FTP Read protocols in the Web Proxy service, and access permission for the SMTP protocol in the WinSock Proxy service. The Quality Control group has access permission only for WWW protocol in the Web Proxy service.

The Interns group has no permissions granted in any of the Proxy Server services. Kate is a member of all four groups. In the Proxy Server services, which protocols does Kate have permission to use?

  1. WWW only

  2. FTP Read and SMTP only

  3. WWW, FTP Read, POP3, and SMTP

  4. WWW and POP3 only

Answer: C

Question No: 173 – (Topic 2)

Which of the following refers to encrypted text?

  1. Plaintext

  2. Cookies

  3. Ciphertext

  4. Hypertext

Answer: C

Question No: 174 – (Topic 2)

You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)

  1. Antivirus and antispyware software

  2. Secure Sockets Layer and digital certificates

  3. Firewall security

  4. Automatic Updates in Windows XP

Answer: A,C

Question No: 175 – (Topic 2)

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

  1. Spoofing

  2. PING attack

  3. Hacking

  4. SYN attack

Answer: A

Question No: 176 – (Topic 2)

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

  1. The presentation layer

  2. The application layer

  3. The transport layer

  4. The session layer

Answer: C

Question No: 177 – (Topic 2)

Which of the following statements about Encapsulating Security Payload (ESP) are true? Each correct answer represents a complete solution. Choose two.

  1. It can also be nested with the Layer Two Tunneling Protocol (L2TP).

  2. It is an IPSec protocol.

  3. It is a text-based communication protocol.

  4. It uses TCP port 22 as the default port and operates at the application layer.

Answer: A,B

Question No: 178 – (Topic 2)

Which of the following best describes the identification, analysis, and ranking of risks?

  1. Design of experiments

  2. Fast tracking

  3. Fixed-price contracts

  4. Plan Risk management

Answer: D

Question No: 179 – (Topic 2)

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.

John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

  1. Operational audit

  2. Non-operational audit

  3. Independent audit

  4. Dependent audit

Answer: C

Question No: 180 – (Topic 2)

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  1. Packet filter firewall

  2. Proxy-based firewall

  3. Stateful firewall

  4. Endian firew

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GISF Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISF Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.