Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


425 Students Passed

95% Average Score

91% Same Questions
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The attacker can exploit any protocol used to go into the internal network or intranet of the company.

B.

The attacker can perform a Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

C.

The attacker can gain access to the Web server in a DMZ and exploit the database.

D.

The attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

Questions # 2:

Which of the following penetration testing phases involves reconnaissance or data gathering?

Options:

A.

Attack phase

B.

Post-attack phase

C.

Pre-attack phase

D.

Out-attack phase

Questions # 3:

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Options:

A.

Dictionary attack

B.

Man-in-the-middle attack

C.

Denial-of-service attack

D.

Password guessing attack

Questions # 4:

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Console

B.

Firewall

C.

Modem

D.

Gateway

E.

Sensor

Questions # 5:

Which of the following applications work as mass-emailing worms?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nimda virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Chernobyl virus

Questions # 6:

You work as a Network Administrator for PassGuide Inc. Adam, your assistant, wants to perform a backup of the server. Which of the following authentication methods will you assign to Adam?

Options:

A.

RBAC

B.

OrBAC

C.

DAC

D.

NAC

Questions # 7:

Which of the following DNS servers provides fault tolerance, load distribution, and easier remote name resolution for the primary DNS server?

Options:

A.

Forwarding server

B.

Root server

C.

Caching-only server

D.

Slave server

Questions # 8:

Which of the following statements are true about WPA?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WPA provides better security than WEP.

B.

Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.

C.

WPA-PSK converts the passphrase into a 256-bit key.

D.

WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.

Questions # 9:

Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

Options:

A.

SWOT analysis

B.

Delphi technique

C.

Isolated pilot groups

D.

Root cause analysis

Questions # 10:

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Vulnerability attack

B.

Denial-of-Service attack

C.

Impersonation attack

D.

Social Engineering attack

Questions # 11:

You work as a technician for Tech Perfect Inc. A user named Rick calls you. He wants to configure a wireless network for his small office. He wants to adopt a wireless technology that supports high data transfer speed. Which of the following technologies will you suggest?

Options:

A.

802.11b

B.

Infrared

C.

Bluetooth

D.

802.11

Questions # 12:

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

C.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

D.

He should restore his Windows settings.

Questions # 13:

You work as a Network Administrator for NetPerfect Inc. You have implemented a firewall on the company's network. You want to ensure that outside users cannot access the internal FTP servers on the network. What will you do to accomplish the task?

Options:

A.

Block the TCP port 443 on the firewall.

B.

Block the UDP port 1701 and TCP port 1723 on the firewall.

C.

Block the TCP port 80 on the firewall.

D.

Block the TCP ports 20 and 21 on the firewall.

Questions # 14:

Which of the following processes is described in the statement below?

"This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Identify Risks

B.

Perform Quantitative Risk Analysis

C.

Monitor and Control Risks

D.

Perform Qualitative Risk Analysis

Questions # 15:

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites.

Which of the following would protect against this?

Options:

A.

Three factor authentication

B.

Two factor authentication

C.

Mutual authentication

D.

MAC

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.