Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Full Version GISF GIAC Exam

Page: 7 / 12
Total 333 questions

GIAC Information Security Fundamentals Questions and Answers

Question 25

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

B.

Send an email to the domain administrator responsible for the initiating IP address.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Close existing email account and open new email account.

Question 26

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Confidentiality

C.

Integrity

D.

Non-repudiation

Question 27

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric

B.

Symmetric

C.

Numeric

D.

Hashing

Question 28

What does Wireless Transport Layer Security (WTLS) provide for wireless devices?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data integrity

B.

Authentication

C.

Encryption

D.

Bandwidth

Page: 7 / 12
Total 333 questions