Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISF Practice Exam with Questions & Answers | Set: 5

Questions 41

Which of the following is used to authenticate asymmetric keys?

Options:
A.

Digital signature

B.

MAC Address

C.

Password

D.

Demilitarized zone (DMZ)

GIAC GISF Premium Access
Questions 42

Which of the following are application layer protocols of Internet protocol (IP) suite?

Each correct answer represents a complete solution. Choose two.

Options:
A.

IGP

B.

IGRP

C.

Telnet

D.

SMTP

Questions 43

You work as a security manager for hackoxiss Inc. The company consists of a perimeter network as its internal network. A number of ethical hackers are employed in the company. You are getting complaints that some employees of the company are trying to intrude other systems on the outer network (Internet). In which of the following ways will you secure the internal as well as the outer network?

Options:
A.

Deny the access of outer users to internal network.

B.

Use distributed firewalls.

C.

Deny the access of internal users to outer network.

D.

Configure ACL on your company's router.

Questions 44

Mark work as a Network Administrator for Roadways Travel Inc. The conmpany wants to implement a strategy for its external employees so that they can connect to Web based applications. What will Mark do to achieve this?

(Click the Exhibit button on the toolbar to see the case study.)

Options:
A.

He will install a VPN server in the VLAN, Roadways, and an IIS server in the corporate LAN at the headquarters.

B.

He will install a VPN server in the corporate LAN at the headquarters and an IIS server in the DMZ.

C.

He will install a VPN server in the DMZ and an IIS server in the corporate LAN at the headquarters.

D.

He will install a VPN server in the VLAN, Roadways, and an IIS server in the DMZ.

Questions 45

In which type of access control do user ID and password system come under?

Options:
A.

Physical

B.

Power

C.

Technical

D.

Administrative

Questions 46

Which of the following monitors program activities and modifies malicious activities on a system?

Options:
A.

Back door

B.

HIDS

C.

RADIUS

D.

NIDS

Questions 47

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

Options:
A.

Security Configuration and Analysis Tool

B.

Active Directory Migration Tool (ADMT)

C.

Task Manager

D.

Group Policy Management Console (GPMC)

Questions 48

Which of the following books is used to examine integrity and availability?

Options:
A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Questions 49

Which of the following types of attacks cannot be prevented by technical measures only?

Options:
A.

Social engineering

B.

Smurf DoS

C.

Brute force

D.

Ping flood attack

Questions 50

Which of the following options cannot be accessed from Windows Update?

Options:
A.

Restore Hidden Updates

B.

Check for Updates

C.

View Update History

D.

View AntiVirus Software Update

Exam Code: GISF
Certification Provider: GIAC
Exam Name: GIAC Information Security Fundamentals
Last Update: Sep 12, 2025
Questions: 333

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.