Create Quiz

GISF GIAC Information Security Fundamentals Quiz

GISF GIAC Information Security Fundamentals Quiz

GISF GIAC Information Security Fundamentals Quiz Test, GISF candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information Issuing body: Global Information Assurance Certification

You can mute/unmute sounds from here

You May Get Result Of GISF GIAC Information Security Fundamentals Quiz


Quiz Questions And Answers

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

Trojan Man

Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing? [GISF GIAC Quiz]

John the Ripper

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise? [GISF GIAC Quiz]

The transport layer port numbers and the application layer headers
The network layer headers and the session layer port numbers
The application layer port numbers and the transport layer headers

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic? [GISF GIAC Quiz]

Autonomous AP
Rogue AP

Which of the following monitors program activities and modifies malicious activities on a system? [GISF GIAC Quiz]

Back door

Which of the following statements is not true about a digital certificate? [GISF GIAC Quiz]

It is used with public key encryption.
It is neither used with public key encryption nor with private key encryption.
It is used with both public key encryption and private key encryption.

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages? [GISF GIAC Quiz]

Cross-Site Request Forgery
Code injection attack
Cross-Site Scripting attack

Which of the following does an anti-virus program update regularly from its manufacturer's Web site? [GISF GIAC Quiz]

Service packs

Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system? [GISF GIAC Quiz]

Disabling all user accounts
Applying egress filtering
Applying a patch to the OS kernel

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records

Electronic Communications Privacy Act of 1986
Economic Espionage Act of 1996
Computer Fraud and Abuse Act

Currently, we have no comments. Be first to comment on this quiz.

GISF GIAC Information Security Fundamentals Quiz : Test Trivia

Ultimate impossible accurate personality honest Quiz Game

Embed This Quiz
Copy the code below to embed this quiz