[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISF Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISF.html

GIAC Information Security Fundamentals

Question No: 61 – (Topic 1)

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

A. F936.28A1.5BCD.DEFA

B. A3-07-B9-E3-BC-F9

C. 1011-0011-1010-1110-1100-0001

D. 132.298.1.23

Answer: B

Question No: 62 – (Topic 1)

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?

Each correct answer represents a complete solution. Choose two.

  1. MS-CHAP v2

  2. WEP

  3. PAP

  4. WPA

Answer: B,C

Question No: 63 – (Topic 1)

You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose?

  1. Signature Based

  2. Passive

  3. Active

  4. Anomaly Based

Answer: A

Question No: 64 – (Topic 1)

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

  1. DES

  2. AES

  3. Symmetric Encryption

  4. Public Key encryption

Answer: D

Question No: 65 – (Topic 1)

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

  1. SHA

  2. AES

  3. MD5

  4. DES

Answer: C

Question No: 66 – (Topic 1)

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

  1. Risk identification

  2. Project schedule

  3. Team members list

  4. Risk analysis

Answer: A,B,C

Question No: 67 – (Topic 1)

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Address Resolution Protocol (ARP)

  2. Network Link Protocol (NWLink)

  3. User Datagram Protocol (UDP)

  4. Internet Control Message Protocol (ICMP)

Answer: A,C,D

Question No: 68 – (Topic 1)

TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

  1. Windows

  2. Red Hat

  3. Solaris

  4. Knoppix

Answer: A

Question No: 69 – (Topic 1)

Which of the following protocols are used by Network Attached Storage (NAS)? Each correct answer represents a complete solution. Choose all that apply.

  1. Apple Filing Protocol (AFP)

  2. Server Message Block (SMB)

  3. Network File System (NFS)

  4. Distributed file system (Dfs)

Answer: A,B,C

Question No: 70 – (Topic 1)

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

  1. Containment

  2. Identification

  3. Preparation

  4. Eradication

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GISF Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISF Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.