GIAC Information Security Fundamentals Exam Practice Test

Page: 1 / 14
Total 451 questions
Question 1

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolvingand deciding over company issues. You have detected a security breach issue in your company.Which of the following procedures regarding the breach is involved in the observe phase of theOODA loop?



Answer : A


Question 2

Your company is covered under a liability insurance policy, which provides various liabilitycoverage for information security risks, including any physical damage of assets, hacking attacks,etc. Which of the following risk management techniques is your company using?



Answer : B


Question 3

Security is a state of well-being of information and infrastructures in which the possibilities of

successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security? Each correct answer represents a complete solution. Choose all that apply.



Answer : A, B, C, D


Question 4

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)



Answer : E


Question 5

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company. Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?



Answer : A


Question 6

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company. Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?



Answer : A


Question 7

Your company is covered under a liability insurance policy, which provides various liability

coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?



Answer : B


Page:    1 / 14   
Total 451 questions