Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISF Practice Exam with Questions & Answers | Set: 4

Questions 31

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:
A.

Web ripping

B.

Email spoofing

C.

Steganography

D.

Social engineering

GIAC GISF Premium Access
Questions 32

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

Options:
A.

18 U.S.C. 1029

B.

18 U.S.C. 1028

C.

18 U.S.C. 1030

D.

18 U.S.C. 2510

Questions 33

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:
A.

Multipartite virus

B.

Boot sector virus

C.

File virus

D.

Stealth virus

E.

Polymorphic virus

Questions 34

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:
A.

Blowfish

B.

Spam

C.

Virus

D.

Trojan horse

E.

Hoax

F.

Rlogin

Questions 35

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Options:
A.

PING attack

B.

Spoofing

C.

Hacking

D.

SYN attack

Questions 36

Your corporate network uses a Proxy Server for Internet access. The Manufacturing group has access permission for WWW protocol in the Web Proxy service, and access permission for POP3 protocol, in the WinSock Proxy service. The Supervisors group has access permission for WWW and FTP Read protocols in the Web Proxy service, and access permission for the SMTP protocol in the WinSock Proxy service. The Quality Control group has access permission only for WWW protocol in the Web Proxy service. The Interns group has no permissions granted in any of the Proxy Server services. Kate is a member of all four groups. In the Proxy Server services, which protocols does Kate have permission to use?

Options:
A.

WWW only

B.

FTP Read and SMTP only

C.

WWW, FTP Read, POP3, and SMTP

D.

WWW and POP3 only

Questions 37

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:
A.

Availability

B.

Integrity

C.

Confidentiality

D.

Non-repudiation

Questions 38

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

Options:
A.

Proxy server

B.

Cookies

C.

Security

D.

Certificate

Questions 39

Firekiller 2000 is an example of a __________.

Options:
A.

DoS attack Trojan

B.

Data sending Trojan

C.

Remote access Trojan

D.

Security software disabler Trojan

Questions 40

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:
A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Access Control List (ACL)

D.

Mandatory Access Control (MAC)

Exam Code: GISF
Certification Provider: GIAC
Exam Name: GIAC Information Security Fundamentals
Last Update: Sep 12, 2025
Questions: 333

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.