New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GISF Reviews Questions

Page: 9 / 12
Total 333 questions

GIAC Information Security Fundamentals Questions and Answers

Question 33

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Economic Espionage Act of 1996

C.

Computer Fraud and Abuse Act

D.

Wiretap Act

Question 34

You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

Options:

A.

Set long session timeouts.

B.

Open up all the unused management ports.

C.

Set similar passwords for each management port.

D.

Ignore usage of the default account settings.

Question 35

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Question 36

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Page: 9 / 12
Total 333 questions