Free GISF Exam Dumps

Question 46

- (Topic 2)
Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

Correct Answer:D

Question 47

- (Topic 2)
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ACDF

Question 48

- (Topic 1)
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are- secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABCD

Question 49

- (Topic 3)
Which of the following statements about a brute force attack is true?

Correct Answer:E

Question 50

- (Topic 1)
Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

Correct Answer:B