New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 4 Question 20 Discussion

Actual exam question for GIAC's GISF exam
Question #: 20
Topic #: 4
[All GISF Questions]

Which of the following service provider classes is used to create a digital signature?

Show Suggested Answer Hide Answer
Suggested Answer: F

Contribute your Thoughts:

0/2000 characters
Tuyet
4 months ago
Really? I didn't know that, sounds interesting!
upvoted 0 times
...
Phyliss
4 months ago
F is the right answer, no doubt about it.
upvoted 0 times
...
Francine
4 months ago
No way, I thought it was SHA1!
upvoted 0 times
...
Jani
4 months ago
I thought it was A at first, but F makes more sense.
upvoted 0 times
...
Johnson
5 months ago
It's definitely F, DSACryptoServiceProvider!
upvoted 0 times
...
Scarlet
5 months ago
I believe it's definitely DSACryptoServiceProvider, but I also recall something about RSA being used for digital signatures.
upvoted 0 times
...
Merissa
5 months ago
I’m a bit confused. I thought RNGCryptoServiceProvider was related to random number generation, not signatures.
upvoted 0 times
...
Emelda
5 months ago
I think the DSACryptoServiceProvider is the one used for digital signatures, but I'm not entirely sure.
upvoted 0 times
...
Aliza
5 months ago
I remember practicing a question about cryptographic service providers, and I feel like SHA1CryptoServiceProvider was mentioned, but it might not be for signatures.
upvoted 0 times
...
Amie
5 months ago
This question seems pretty straightforward. I'm pretty confident I know the definition of personal data based on the GDPR, so I'll go with option B.
upvoted 0 times
...
Micaela
5 months ago
Okay, I think I've got a handle on this. The two best options are A and C. Using managed export to Cloud Storage with Nearline or Coldline class seems like a great way to archive the data long-term at a low cost. And using managed export to import into a BigQuery table is also a good approach, as it allows for point-in-time recovery and cloning. I feel pretty confident about those two choices.
upvoted 0 times
...
Osvaldo
5 months ago
I think I've got this one figured out. Option C is clearly the way to go - it hits all the key points. Transport-layer security between B and C for efficiency, and message-layer encryption between A and B to maintain confidentiality without sharing keys. Solid strategy, in my opinion.
upvoted 0 times
...

Save Cancel