Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

GSLC GIAC Security Leadership Certification (GSLC) Questions and Answers

Questions 4

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Exposure Factor (EF)

C.

Annualized Rate of Occurrence (ARO)

D.

Safeguard

Buy Now
Questions 5

You are configuring IPS (Intrusion Prevention System) on a Cisco IOS router. The IPS Policy Wizard window opens when you confirm the SDEE messages. Which of the following tasks can you perform using the IPS Policy Wizard window?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Select the direction of traffic for inspecting the events.

B.

Select an encryption method to improve security.

C.

Select the interface for applying the IPS rule.

D.

Select the SDF file which a user can use.

Buy Now
Questions 6

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Console

B.

Firewall

C.

Modem

D.

Gateway

E.

Sensor

Buy Now
Questions 7

You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required. Which of the following are the steps you should take to secure network printers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Remove the printers from the network and do not allow remote printing.

B.

Ensure that the printers hard drive is scanned for spyware.

C.

Secure all remote administrative protocols such as telnet.

D.

Do not allow duplicate print jobs.

E.

Limit the size of print jobs on the printer.

Buy Now
Questions 8

PassGuide Research and Training Center is developing its new network model. Which of the following protocols should be implemented in the new network? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

Options:

A.

IPX/SPX

B.

NetBEUI

C.

TCP/IP

D.

AppleTalk

Buy Now
Questions 9

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

Options:

A.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

B.

The laptop will be able to access the wireless network but the security will be compromised.

C.

The WAP will allow the connection with the guest account's privileges.

D.

The laptop will not be able to access the wireless network.

Buy Now
Questions 10

Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?

Options:

A.

Digital signature

B.

Hash algorithm

C.

Public-key

D.

Quantum

Buy Now
Questions 11

Which of the following types of authentication is generally used for public Internet Web sites?

Options:

A.

Anonymous authentication

B.

Integrated Windows authentication

C.

Basic authentication

D.

Digest authentication

Buy Now
Questions 12

Which of the following RAID standards distributes data across multiple disks in a way that gives improved speed at any given instant?

Options:

A.

RAID 01

B.

RAID 3/4

C.

RAID 1

D.

RAID 0

Buy Now
Questions 13

Which of the following documents is described in the statement below?

"It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

Options:

A.

Risk register

B.

Quality management plan

C.

Project charter

D.

Risk management plan

Buy Now
Questions 14

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

C.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

D.

He should restore his Windows settings.

Buy Now
Questions 15

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Cost plus percentage of costs

C.

Time and materials

D.

Fixed fee

Buy Now
Questions 16

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

mysql_escape_string()

B.

session_regenerate_id()

C.

mysql_real_escape_string()

D.

Prepared statement

Buy Now
Questions 17

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email you@gmail.com' and press the submit button. The Web application displays the server error. What can be the reason of the error?

Options:

A.

The remote server is down.

B.

Email entered is not valid.

C.

Your internet connection is slow.

D.

You have entered any special character in email.

Buy Now
Questions 18

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites.

Which of the following would protect against this?

Options:

A.

Three factor authentication

B.

Two factor authentication

C.

Mutual authentication

D.

MAC

Buy Now
Questions 19

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use the Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hidden partition

B.

Dumb space

C.

Slack space

D.

Unused sectors

Buy Now
Questions 20

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Integrity

C.

Non-repudiation

D.

Confidentiality

Buy Now
Questions 21

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC

B.

MAC

C.

RBAC

D.

DAC

Buy Now
Questions 22

Which of the following terms describes the statement given below?

"It refers to a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects, and goals. This set encompasses a wide scope of activities, and these include planning, allocating, setting goals, delegation, analysis of time spent, monitoring, organizing, scheduling, and prioritizing."

Options:

A.

Time Management

B.

Digital Rights Management

C.

Perception Management

D.

Change Management

Buy Now
Questions 23

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

Options:

A.

18 U.S.C. 2510

B.

18 U.S.C. 1029

C.

18 U.S.C. 1028

D.

18 U.S.C. 1030

Buy Now
Questions 24

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security policy

B.

Auditing

C.

Security awareness training

D.

Data Backup

Buy Now
Questions 25

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Steganography

B.

Email spoofing

C.

Social engineering

D.

Web ripping

Buy Now
Questions 26

What are the steps related to the vulnerability management program?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Baseline the Environment

B.

Maintain and Monitor

C.

Organization Vulnerability

D.

Define Policy

Buy Now
Questions 27

Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

Options:

A.

Macro

B.

Polymorphic

C.

Logic Bomb

D.

Boot sector

Buy Now
Questions 28

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You have recently added three new SCSI hard disk drives to a domain controller that already has two physical disk drives. The new SCSI disk drives are configured in a RAID-5 array. You are required to enhance the performance of the Active Directory database on the domain controller. Which of the following steps will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Move the log files to a separate physical disk other than the one used in RAID-5 or used by the operating system.

B.

Move the log files to the RAID-5 array.

C.

Move the NTDS.DIT file to the RAID-5 array.

D.

Move the NTDS.DIT file to a disk other than the one used in RAID-5 or used by the operating system.

Buy Now
Questions 29

You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?

Options:

A.

Mail bombing

B.

Distributed denial of service (DDOS) attack

C.

Brute force attack

D.

Malware installation from unknown Web sites

Buy Now
Questions 30

Which of the following is a fake target that deters hackers from locating your real network?

Options:

A.

Malware

B.

Honeypot

C.

KFSensor

D.

Spyware

Buy Now
Questions 31

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address 210.213.23.21. This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

Options:

A.

24171811

B.

24171311

C.

24619311

D.

24171111

Buy Now
Questions 32

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Dumpster diving

C.

Spam

D.

Encapsulation

Buy Now
Questions 33

You work as a Network Administrator for Net Perfect Inc. The company's intranet Web site netperfect.com uses a digital certificate issued by the company's Enterprise Certificate Authority. The Enterprise Certificate Authority is located on a server named certificates.netperfect.com. Kate, a user, complains that she is unable to access the secure Web site on her computer using Internet Explorer. An error message appears stating that the digital certificate is not from a trusted source. What is the most likely cause?

Options:

A.

Kate's computer is not configured with the digital certificate.

B.

The company's intranet server is not configured to support remote connections.

C.

Kate is not a member of the Administrators group.

D.

Kate is not using https protocol to connect to the secure Web site.

Buy Now
Questions 34

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

Options:

A.

Application-level gateway

B.

Proxy server

C.

Firewall

D.

DMZ

Buy Now
Questions 35

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Identification

B.

Configuration Item Costing

C.

Configuration Status Accounting

D.

Configuration Verification and Auditing

Buy Now
Questions 36

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Buy Now
Questions 37

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WEP key

B.

IP address of the router

C.

MAC address of the router

D.

SSID of the WLAN

Buy Now
Questions 38

Which of the following statements about front door attack is true?

Options:

A.

In this type of attack, the hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses a dictionary of common words to find out the password of a user.

C.

This type of attack is used to sniff passwords or information from a legitimate transaction to be used for the hacker's advantage.

D.

In this type of attack, the hacker has all the correct information to get into a system and does not have to perform any additional task to get that information.

Buy Now
Questions 39

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is consists of various protocols present in each layer.

B.

It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

C.

It is generally described as having five abstraction layers.

D.

It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

Buy Now
Questions 40

Mark works as a Network Administrator for Technet Inc. The company has a Windows 2003 domainbased network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the RAID-5 volume?

Options:

A.

Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.

B.

Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

C.

Use Disk Management, select the failed drive, and then regenerate the volume.

D.

Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.

Buy Now
Questions 41

You work as an Exchange Administrator for McRobert Inc. You are configuring a new Exchange 2000 Server computer and two storage groups, group A and group B, on your network. You have to configure the physical disks on the Exchange 2000 Server computer to provide better performance and availability. Which configuration will you use to achieve this?

Options:

A.

Mirrored ---- Transaction Log Files (group A)

Mirrored ---- Transaction Log Files (group B)

RAID5 ------ Information store (groups A and B)

B.

Single drive ---- Transaction Log Files (group A)

Single drive ---- Transaction Log Files (group B)

RAID5 --------- Information Store (groups A and B)

C.

Mirrored ---- Transaction Log Files ( groups A and B)

RAID5 ------ Information Store (groups A and B)

D.

Single drive ----- Transaction Log Files (group A)

Single drive ----- Transaction Log Files (group B)

RAID5 ----------- Information Store (group A)

RAID5 ----------- Information Store (group B)

Buy Now
Questions 42

Which of the following techniques is based on a set of criteria that has been acquired in a specific knowledge area or product area?

Options:

A.

Expert judgment

B.

Program Evaluation Review Technique (PERT) chart

C.

Function Point Analysis (FP Analysis)

D.

Delphi technique

Buy Now
Questions 43

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Off-channel verification.

B.

Using Secret keys for authentication.

C.

Using basic authentication.

D.

Using public key infrastructure authentication.

Buy Now
Questions 44

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card?

Each correct answer represents a complete solution. Choose two.

Options:

A.

These tools can determine the authorization status of an access point.

B.

These tools cannot detect rogue access points if the victim is using data encryption.

C.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

D.

These tools can determine the rogue access point even when it is attached to a wired network.

Buy Now
Questions 45

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

Options:

A.

Project Integration Management

B.

Project Time Management

C.

Project Scope Management

D.

Project Risk Management

Buy Now
Questions 46

John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

Social engineering

B.

Replay attack

C.

Trojan horse

D.

DoS

Buy Now
Questions 47

Mark works as a Network Administrator for NetTech Inc. Several employees of the company work from the remote locations. The company provides a dial-up connection to employees to connect to the company's network using remote access service. Mark wants to implement call back feature for the employees who are dialing for long distance. Which of the following protocols will he use for remote access services to accomplish the task?

Options:

A.

SLIP

B.

WEP

C.

UDP

D.

PPP

Buy Now
Questions 48

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

Options:

A.

Malware protection

B.

Firewall

C.

Automatic updating

D.

Other security settings

Buy Now
Questions 49

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Demilitarized zone (DMZ)

C.

Packet filtering

D.

Firewall

Buy Now
Questions 50

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 51

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:

A.

RSA

B.

TripleDES

C.

DES

D.

AES

Buy Now
Questions 52

Rick works as the Network Administrator of a Windows 2000 network. The network consists of 30 domain controllers, 65 member servers, and 5000 workstations. All the computers on the network use Windows 2000 Advanced Server, Windows 2000 Server, and Windows 2000 Professional operating systems. The Windows 2000 Advanced Server computers are running the Cluster Service. The network uses TCP/IP as its only protocol. Once a week Rick works from home. But rest of the weekdays, he has to travel. Rick wants to be able to remotely administer each Windows 2000 server on his network with the following considerations:

• He must be able to establish a VPN connection to the Windows 2000 Server computers on the network from his home, so that the data remain encrypted and encapsulated during data transfer.

• While traveling , he must be able to connect to the network from a laptop computer via remote access connection, so that he can perform any task on the main Windows 2000 domain controller.

• While traveling, he must be able to edit the registry of the Windows 2000 Server computer.

• During the migration process to Windows 2000, he depleted all the financial resources for licensing. Therefore, he must not be required to add additional licenses to the network.

Rick takes the following actions:

• He implements the VPN connection on the proper server, the laptop computer, and the home computer.

• He configures the VPN connection to use the IPSec protocol in Encapsulating Security Payload (ESP) Tunnel Mode.

• He implements Windows 2000 Terminal Services using the Remote Administration mode on the Windows 2000 servers.

• He installs and configures Routing and Remote Access properly.

Which of the following goals will be accomplished by these actions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

While traveling, he will be able to connect to the network from a laptop computer via remote access connection so that he can perform any task on the main Windows 2000 domain controller.

B.

While traveling, he will be able to edit the registry of the Windows 2000 Server computer.

C.

He will not be required to add additional licenses to the network.

D.

He will be able to establish a VPN connection to the Windows 2000 Server computers on the network from his home, so that the data remains encrypted and encapsulated during data transfer.

Buy Now
Questions 53

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

DNS zone transfer

B.

SNMP enumeration

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Questions 54

Which of the following can be performed to verify the effectiveness of a quality management system?

Options:

A.

Configuration auditing

B.

Benchmarking

C.

Project analysis

D.

Quality audits

Buy Now
Questions 55

Which firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network?

Options:

A.

Deep packet inspection

B.

Packet hosting

C.

Screened host

D.

Packet filtering

Buy Now
Questions 56

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:

• HTTP

• SSL

• SSH

• IPSec

Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSH

B.

IPSec

C.

HTTP

D.

SSL

Buy Now
Questions 57

Which of the following is a popular replacement for halon gas?

Options:

A.

FM-200

B.

CO2

C.

SO2

D.

Ozone

Buy Now
Questions 58

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Digest authentication is a more secure authentication method as compared to Basic authentication.

B.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

C.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

Buy Now
Questions 59

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Options:

A.

Network anti-spyware software

B.

Network anti-virus software

C.

Site surveys

D.

Protocol analyzers

Buy Now
Questions 60

Which of the following honeypots captures limited amounts of information, mainly transactional data and some limited interaction?

Options:

A.

Low-interaction

B.

High-interaction

C.

Network

D.

Medium-interaction

Buy Now
Questions 61

What does noise in a power line indicate?

Options:

A.

Power degradation that is low and less than normal

B.

Interference superimposed onto the power line

C.

Momentary high voltage

D.

Prolonged loss of power

Buy Now
Questions 62

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MAC filtering on the router

B.

Strong password policies on workstations.

C.

Not broadcasting SSID

D.

Using either WEP or WPA encryption

E.

Hardening the server OS

Buy Now
Questions 63

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

TLS

C.

SNMP

D.

SSL

Buy Now
Questions 64

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Buy Now
Questions 65

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

Mac flooding

B.

DNS poisoning

C.

IP spoofing

D.

Man-in-the-middle

Buy Now
Questions 66

Which of the following is the rating for gasoline or oil fires?

Options:

A.

Class C

B.

Class B

C.

Class D

D.

Class A

Buy Now
Questions 67

John works as a network security officer in Gentech Inc. The company uses a TCP/IP network. While working on the network, a problem occurs related to the DNS resolution. Which of the following utilities can he use to diagnose the problem?

Options:

A.

IPConfig

B.

Ping

C.

Tracert

D.

nslookup

Buy Now
Questions 68

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC

B.

DAC

C.

RBAC

D.

MAC

Buy Now
Questions 69

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

Options:

A.

WinSSLMiM

B.

httprint

C.

ServerMask

D.

Whisker

Buy Now
Questions 70

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks except for which one?

Options:

A.

Implement the IPP printing capability.

B.

Conduct frequent scans for server vulnerabilities.

C.

Install the upgrades of Microsoft service packs.

D.

Implement effective firewalls.

Buy Now
Questions 71

Which of the following processes is NOT a part of the Project Procurement Management Knowledge Area?

Options:

A.

Develop Project Management Plan

B.

Request Seller Responses

C.

Contract Administration

D.

Plan Purchases and Acquisitions

Buy Now
Questions 72

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

Buy Now
Questions 73

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:

HTTP

SSL

SSH

IPSec

Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSH

B.

SSL

C.

HTTP

D.

IPSec

Buy Now
Questions 74

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Stick

B.

ADMutate

C.

Absinthe

D.

Fragroute

Buy Now
Questions 75

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

Options:

A.

Armored virus

B.

Stealth virus

C.

Multipartite virus

D.

Polymorphic virus

Buy Now
Questions 76

Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?

Options:

A.

Proxy server

B.

Domain tasting

C.

NMap

D.

PsPasswd

Buy Now
Questions 77

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WEP

B.

Don't broadcast SSID

C.

Implement MAC filtering

D.

Implement WPA

Buy Now
Questions 78

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Options:

A.

Single Sign-On

B.

Dynamic

C.

One-time password

D.

Kerberos

Buy Now
Questions 79

You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?

Options:

A.

A Virus

B.

A reactive IDS.

C.

A Honey Pot

D.

A Polymorphic Virus

Buy Now
Questions 80

You work as Network and Security Manager for PassGuide Inc. The management of the company is quite concerned about the security of the network. The management has assigned this task to you to improve the security. Which of the following access methods will you use if the method is to be primarily based on pre-established access, and users cannot change it?

Options:

A.

PAC

B.

OrBAC

C.

MAC

D.

RBAC

Buy Now
Questions 81

Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?

Options:

A.

PERT

B.

CPM

C.

FP

D.

Gantt

Buy Now
Questions 82

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 83

Which of the following domains of the DNS hierarchy consists of categories found at the end of domain names, such as .com or .uk and divides the domains into organizations (.org), businesses (.com), countries (.uk), and other categories?

Options:

A.

Top-level domain

B.

Root-level domain

C.

Second level domain

D.

Name server

Buy Now
Questions 84

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

Snort

B.

RealSecure

C.

Tripwire

D.

StealthWatch

Buy Now
Questions 85

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Corrupted or missing files.

B.

Sudden reduction in system resources.

C.

Faster read/write access of the CD-ROM drive.

D.

Unclear monitor display.

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Apr 26, 2024
Questions: 567
GSLC pdf

GSLC PDF

$28  $80
GSLC Engine

GSLC Testing Engine

$33.25  $95
GSLC PDF + Engine

GSLC PDF + Testing Engine

$45.5  $130