Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GISF GIAC Information Security Fundamentals Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GISF GIAC Information Security Fundamentals certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 5
Total 333 questions

You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?

A.

Intranet

B.

Local Area Network

C.

Internet

D.

Demilitarized Zone

E.

Extranet

F.

Wide Area Network

Bluetooth uses the _________ specification in the ________ band with FHSS technology.

A.

IEEE 802.11, 2.4-2.5 GHz

B.

IEEE 802.11, 1.4-2.5 GHz

C.

IEEE 802.15, 1.5-2.0 GHz

D.

IEEE 802.15, 2.4-2.5 GHz

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?

A.

MD5

B.

DES

C.

Symmetric Encryption

D.

Asymmetric Encryption

Fill in the blank with the appropriate value. SHA-1 produces a ______-bit message digest.

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

A.

Don't stay logged on as an administrator.

B.

Use a firewall.

C.

Keep the computer up-to-date.

D.

Run antivirus software on the computer.

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B.

Black box testing simulates an attack from someone who is unfamiliar with the system.

C.

Black box testing simulates an attack from someone who is familiar with the system.

D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.

What are packet sniffers?

A.

Packet sniffers encrypt the packages as they cross the network.

B.

Packet sniffers test package security.

C.

Packet sniffers test the packages to verify data integrity.

D.

Packet sniffers capture the packages as they cross the network.

Which of the following IDS/IPS detection methods do the URLs use to detect and prevent an attack?

A.

Encryption-based detection

B.

Policy-based detection

C.

Signature-based detection

D.

Internet bot detection

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

A.

Automatic updating

B.

Firewall

C.

Malware protection

D.

Content Advisor

Which of the following encryption techniques does digital signatures use?

A.

MD5

B.

RSA

C.

IDEA

D.

Blowfish

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

A.

The Service Level Manager

B.

The Configuration Manager

C.

The IT Security Manager

D.

The Change Manager

You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)

A.

Antivirus and antispyware software

B.

Secure Sockets Layer and digital certificates

C.

Firewall security

D.

Automatic Updates in Windows XP

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

A.

Multipartite virus

B.

Polymorphic virus

C.

Armored virus

D.

Stealth virus

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A.

Trademark laws

B.

Patent laws

C.

Copyright laws

D.

Code Security law

Which of the following is NOT a phase of the OODA Loop strategy?

A.

Observe

B.

Define

C.

Orient

D.

Act

Which of the following security applications is used to secure a database from unauthorized accesses in a network infrastructure?

A.

Antivirus

B.

Anti-Malware

C.

Anti-Spoofing

D.

Firewall

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:

1. Encryption should be used for authentication of all traffic to the Web site.

2. SSL should not be used on the Web server for performance reasons.

3. Users should be authenticated using their Active Directory credentials.

In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?

A.

Enable the Anonymous Authentication setting on the server.

B.

Enable the Encrypting File System (EFS) on the server.

C.

Enable the Digest Authentication setting on the server.

D.

Enable the Windows Authentication setting on the server.

Tom and Gary are in a debate over which software should be purchased as part of their project. Gary tells Tom that because he's the senior software developer and has been with the company for 12 years, he'll be making the decision on the software. What type of conflict resolution has happened in this instance?

A.

Avoiding

B.

Forcing

C.

Compromising

D.

Smoothing

You have been tasked with finding an encryption methodology for your company's network. The solution must use public key encryption which is keyed to the users email address. Which of the following should you select?

A.

AES

B.

3DES

C.

PGP

D.

Blowfish

The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users?

A.

You must purchase a third party firewall solution for your mobile users.

B.

Do nothing. Windows XP service pack 2 has a firewall turned on by default.

C.

Download the SPI template from Microsoft.

D.

Configure the Windows XP firewall to use SPI.

Page: 1 / 5
Total 333 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved