GIAC gisf practice test

GIAC Information Security Fundamentals Exam


Question 1

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network
andsoftware security threats since a few months. You want to renew your current security policies
andmanagement to enhance the safety of your information systems. Which of the following is the
bestpractice to initiate the renewal process from the lowest level with the least managerial effort?
A. Start the Incident handling process.
B. Change the entire security policy.
C. Perform an IT audit.
D. Switch to a new network infrastructure.

Answer:

C
141/141

Discussions

Question 2

Hardening a system is one of the practical methods of securing a computer system. Which of
thefollowing techniques is used for hardening a computer system?

  • A. Disabling all user accounts
  • B. Applying egress filtering
  • C. Applying Access Control List (ACL)
  • D. Applying a patch to the OS kernel
Answer:

D

Discussions

Question 3

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008
domainbasednetwork. The network has three Windows Server 2008 member servers and 150
Windows Vista clientcomputers. According to the company's security policy, you apply Windows
firewall setting to thecomputers on the network. Now, you are troubleshooting a connectivity
problem that might be caused byWindows firewall. What will you do to identify connections that
Windows firewall allows or blocks?
A. Configure Network address translation (NAT).
B. Disable Windows firewall logging.
C. Configure Internet Protocol Security (IPSec).
D. Enable Windows firewall logging.

Answer:

D
140/141
Questions & Answers PDF
P-

Discussions

Question 4

Which of the following does an anti-virus program update regularly from its manufacturer's Website?

  • A. Hotfixes
  • B. Definition
  • C. Service packs
  • D. Permissions
Answer:

B

Discussions

Question 5

Which of the following Acts enacted in United States allows the FBI to issue National SecurityLetters
(NSLs) to Internet service providers (ISPs) ordering them to disclose records about theircustomers?

  • A. Electronic Communications Privacy Act of 1986
  • B. Economic Espionage Act of 1996
  • C. Computer Fraud and Abuse Act
  • D. Wiretap Act
Answer:

A

Discussions

Question 6

How long are cookies in effect if no expiration date is set?
139/141
Questions & Answers PDF
P-

  • A. Fifteen days
  • B. Until the session ends.
  • C. Forever
  • D. One year
Answer:

B

Discussions

Question 7

How should you configure the Regional Centers' e-mail, so that it is secure and encrypted?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. Use EFS.
  • B. Use IPSec.
  • C. Use S/MIME.
  • D. Use TLS.
Answer:

C

Discussions

Question 8

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolvingand
deciding over company issues. You have detected a security breach issue in your company.Which of
the following procedures regarding the breach is involved in the observe phase of theOODA loop?

  • A. Follow the company security guidelines.
  • B. Decide an activity based on a hypothesis.
  • C. Implement an action practically as policies.
  • D. Consider previous experiences of security breaches.
Answer:

A

Discussions

Question 9

You have successfully installed an IRM server into your environment. This IRM server will be utilized
to protect the company's videos, which are available to all employees but contain sensitive data. You
log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section.
What option should you now choose so that you can input the RMS server name for the WSS 3.0
server to use?

  • A. Self-service site management
  • B. Content databases
  • C. Information Rights Management
  • D. Define managed paths
Answer:

C

Discussions

Question 10

Your company is covered under a liability insurance policy, which provides various liabilitycoverage
for information security risks, including any physical damage of assets, hacking attacks,etc. Which of
the following risk management techniques is your company using?

  • A. Risk acceptance
  • B. Risk transfer
  • C. Risk avoidance
  • D. Risk mitigation 138/141 Questions & Answers PDF P-
Answer:

B

Discussions
To page 2