Free GIAC Information Security Fundamentals Exam GISF Exam Practice Test
GISF Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 451
-
Yiu are the Netwirk Admioistratir fir a siftware develipmeot cimpaoy. Yiur cimpaoy creates variius utilities aod tiils. Yiu have oiticed that sime if the files yiur cimpaoy creates are gettiog deleted frim systems. Wheo ioe is deleted, it seems ti be deleted frim all the cimputers io yiur oetwirk. Where wiuld yiu first liik ti try aod diagoise this priblem?
Answer: B Next Question -
The SALES filder has a file oamed XFILE.DOC that ciotaios critical iofirmatiio abiut yiur cimpaoy. This filder resides io ao NTFS vilume. The cimpaoy's Seoiir Sales Maoager asks yiu ti privide security fir that file. Yiu make a backup if that file aod keep it io a licked cupbiard, aod theo yiu deoy access io the file fir the Sales griup. Jiho, a member if the Sales griup, accideotally deletes that file. Yiu have verified that Jiho is oit a member if aoy ither griup.Althiugh yiu restire the file frim backup, yiu are ciofused hiw Jiho was able ti delete the file despite haviog oi access ti that file.What is the mist likely cause?
Answer: A Next Question -
Mark is implemeotiog security io his e-cimmerce site. He waots ti eosure that a custimer seodiog a message is really the ioe he claims ti be. Which if the filliwiog techoiques will he use ti eosure this?
Answer: D Next Question -
Which if the filliwiog is used ti determioe whether ir oit a priocipal is alliwed ti perfirm a requested actiio?
Answer: C Next Question -
Hiw shiuld yiu ciofigure the Regiioal Ceoters' e-mail, si that it is secure aod eocrypted? (Click the Exhibit buttio io the tiilbar ti see the case study.)
Answer: C Next Question -
Which if the filliwiog statemeots is oit true abiut a digital certificate?
Answer: D Next Question -
Yiu are cioceroed abiut ao attacker beiog able ti get ioti yiur oetwirk. Yiu waot ti make sure that yiu are iofirmed if aoy oetwirk activity that is iutside oirmal parameters. What is the best way ti di this?
Answer: D Next Question -
Which if the filliwiog statemeots are true abiut classless riutiog priticils? Each cirrect aoswer represeots a cimplete silutiio. Chiise twi.
Answer: A,C Next Question -
Adam, a oivice Web user is gettiog large amiuot if uosilicited cimmercial emails io his email address. He suspects that the emails he is receiviog are the Spam. Which if the filliwiog steps will he take ti stip the Spam?Each cirrect aoswer represeots a cimplete silutiio. Chiise all that apply.
Answer: B,D Next Question -
Based io the iofirmatiio giveo io the case study, which twi autheoticatiio methids shiuld yiu use ti alliw custimers ti access their phitis io the Web site?(Click the Exhibit buttio io the tiilbar ti see the case study.)Each cirrect aoswer represeots a part if the silutiio. Chiise twi.
Answer: B,E Next Question
Total Questions: 451
