New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GISF Questions Bank

Page: 4 / 12
Total 333 questions

GIAC Information Security Fundamentals Questions and Answers

Question 13

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Status Accounting

B.

Configuration Item Costing

C.

Configuration Identification

D.

Configuration Verification and Auditing

Question 14

Peter is a merchant. He uses symmetric encryption to send confidential messages to different users of his Web site. Which of the following is the other name for asymmetric encryption?

Options:

A.

Session key encryption

B.

Public key encryption

C.

Secret key encryption

D.

Shared key encryption

Question 15

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

1. To account for all IT assets

2. To provide precise information support to other ITIL disciplines

3. To provide a solid base only for Incident and Problem Management

4. To verify configuration records and correct any exceptions

Options:

A.

2 and 4 only

B.

1, 3, and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Question 16

Your computer continues to operate even if its disk drive has failed. This ability is known as _____.

Options:

A.

Recovery

B.

Fault Tolerance

C.

Backups

D.

Disaster Recovery

E.

Hashing

F.

Independent Disks

Page: 4 / 12
Total 333 questions