[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISF Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISF.html

GIAC Information Security Fundamentals

Question No: 81 – (Topic 1)

You work as an executive manager for Mariotx.Inc. You entered into a business contract with a firm called Helfixnet.Inc. You passed on the contract details to Helfixnet.Inc and also got an acceptance approval. You later find that Helfixnet.Inc is violating the rules of the contract and they claim that they had never entered into any contract with Mariotx.Inc when asked. Which of the following directives of Information Assurance can you apply to ensure prevention from such issues?

  1. Confidentiality

  2. Non-repudiation

  3. Data integrity

  4. Data availability

Answer: B

Question No: 82 – (Topic 1)

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network.

You want to apply an additional network packet filtering device that is intermediate to your enterprise#39;s internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

  1. Autonomous system area (AS)

  2. Demilitarized zone (DMZ)

  3. Border network area

  4. Site network area

Answer: C

Question No: 83 – (Topic 1)

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?

Each correct answer represents a complete solution. Choose all that apply.

  1. It can be based upon fingerprint or eye recognition.

  2. It can be time-synchronous.

  3. It provides security against the virus attacks.

  4. It provides security against Eavesdropping.

  5. It checks the authenticity of a person.

  6. It is used to encrypt a message before transmitting it on a network.

Answer: A,B,E

Question No: 84 – (Topic 1)

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?

  1. IPLog

  2. Snort

  3. Timbersee

  4. Swatch

Answer: B

Question No: 85 – (Topic 1)

Which of the following factors determine the strength of the encryption?

  1. Character-set encoding

  2. Length of the key

  3. Operating system

  4. Ease of use

Answer: B

Question No: 86 – (Topic 1)

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

  1. Public key

  2. Digital certificates

  3. Twofish

  4. RSA

Answer: A,B

Question No: 87 – (Topic 1)

You work as a SharePoint Administrator for TechWorld Inc. You must protect your SharePoint server farm from viruses that are accidentally uploaded to the SharePoint libraries. You have installed antivirus software that is designed for use with Windows SharePoint server. You have logged on to the Central Administration site.

How can you configure the SharePoint site so that the document libraries are protected?

  1. SharePoint does not support antivirus solutions.

  2. Restrict users to read only on document libraries.

  3. Choose the Scan documents on upload option in the antivirus settings.

  4. Require all documents to be scanned on the local PC before uploading to the SharePoint sit e.

Answer: C

Question No: 88 – (Topic 1)

Which of the following are application layer protocols of Internet protocol (IP) suite? Each correct answer represents a complete solution. Choose two.

  1. IGP

  2. IGRP

  3. Telnet

  4. SMTP

Answer: C,D

Question No: 89 – (Topic 1)

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

  1. PKI

  2. MD5

  3. SHA

  4. Kerberos

Answer: B

Question No: 90 – (Topic 1)

Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits?

  1. Service Asset and Configuration Management

  2. Service Request Management

  3. Event Management

  4. Service Level Management

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GISF Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISF Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.