GIAC GISF - GIAC Information Security Fundamentals Exam

Page:    1 / 67   
Total 333 questions

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  • A. Risk acceptance
  • B. Risk transfer
  • C. Risk avoidance
  • D. Risk mitigation


Answer : B

You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?

  • A. Self-service site management
  • B. Content databases
  • C. Information Rights Management
  • D. Define managed paths


Answer : C

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company.
Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?

  • A. Follow the company security guidelines.
  • B. Decide an activity based on a hypothesis.
  • C. Implement an action practically as policies.
  • D. Consider previous experiences of security breaches.


Answer : A

How should you configure the Regional Centers' e-mail, so that it is secure and encrypted?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. Use EFS.
  • B. Use IPSec.
  • C. Use S/MIME.
  • D. Use TLS.


Answer : C

How long are cookies in effect if no expiration date is set?

  • A. Fifteen days
  • B. Until the session ends.
  • C. Forever
  • D. One year


Answer : B

Page:    1 / 67   
Total 333 questions