Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISF Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.

Options:
A.

They are considered an indicator of threats coupled with vulnerability.

B.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

C.

They can be removed completely by taking proper actions.

D.

They can be analyzed and measured by the risk analysis process.

GIAC GISF Premium Access
Questions 22

What is a variant with regard to Configuration Management?

Options:
A.

A CI that has the same name as another CI but shares no relationship.

B.

A CI that has the same essential functionality as another CI but a bit different in some small manner.

C.

A CI that particularly refers to a hardware specification.

D.

A CI that particularly refers to a software version.

Questions 23

Which of the following is the best approach to conflict resolution?

Options:
A.

Hard work and understanding

B.

Mutual respect and cooperation

C.

Flexibility

D.

Sincerity and hard work

Questions 24

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:
A.

Antivirus software

B.

Gateway

C.

Firewall

D.

Bridge

Questions 25

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

B.

It is an IPSec protocol.

C.

It is a text-based communication protocol.

D.

It uses TCP port 22 as the default port and operates at the application layer.

Questions 26

The executive team wants you to track labor costs for your project as well as progress on task completion and the resulting dates. What information must you update for tasks to provide this information?

Options:
A.

Start, Work, and Remaining Work

B.

Actual Start and Percent Complete

C.

Actual Start, Actual Work, and Remaining Work

D.

Actual Start, Percent Complete, and Remaining Duration

Questions 27

Which of the following can be used to prevent routing loops in distance vector routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Split horizon

B.

Link-state advertisement

C.

Spanning Tree Protocol

D.

Hold-down timers

Questions 28

You are the program manager of the BHG Program. One of the projects in your program will be using new materials that are somewhat untested. You are worried that there may be delays and waste because the project team is unaware of how to accurately use these materials. You elect to send the people that will be using the new materials through training on how to complete their project work. You also allow them to purchase some of the materials to experiment on their use before the actual project work is to be done. You want to ensure that mistakes do not enter into the project. What type of action have you provided in this scenario?

Options:
A.

This is an example of team development.

B.

This is an example of a corrective action.

C.

This is an example of quality assurance.

D.

This is an example of a preventive action.

Questions 29

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP-based router. You have configured a router on your network. You want to accomplish the following goals:

l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode.

l The password must be listed as a hidden entry in the configuration file.

You run the following command: enable password

Which of the goals will this action accomplish?

Options:
A.

The password will be listed as a hidden entry in the configuration file

B.

The action will accomplish neither of the goals

C.

The action will accomplish both the goals

D.

The router will require a password to move from user EXEC mode to privileged EXEC mode

Questions 30

Which of the following is NOT a phase of the OODA Loop strategy?

Options:
A.

Observe

B.

Define

C.

Orient

D.

Act

Exam Code: GISF
Certification Provider: GIAC
Exam Name: GIAC Information Security Fundamentals
Last Update: Sep 12, 2025
Questions: 333

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.