Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions
Questions # 151:

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.

Acceptance

B.

Transference

C.

Mitigation

D.

Avoidance

Questions # 152:

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

B.

Remove the SNMP agent or disable the SNMP service.

C.

Monitor the programs running on the server to see whether any new process is running on the server or not.

D.

Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Questions # 153:

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and two subordinate CAs. The root CA will be used to issue certificates to the subordinate CAs, and the subordinate CAs will be used to issue certificates to the clients. The security policy of the company dictates that the security of high-level CAs should not be compromised. Which of the following steps will you take to implement the security policy of the company?

Options:

A.

Take the root enterprise CA offline after it issues certificates to its subordinate CAs.

B.

Place all CA servers in a locked room.

C.

Take subordinate CAs offline after they get their certificates from the root CA.

D.

Configure a firewall on the network.

Questions # 154:

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WEP

B.

Don't broadcast SSID

C.

Implement MAC filtering

D.

Implement WPA

Questions # 155:

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server. Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Policy-based detection

B.

Signature-based detection

C.

Anamoly-based detection

D.

Honey pot detection

Questions # 156:

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Stealth

B.

Snow

C.

Blindside

D.

ImageHide

Questions # 157:

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

Options:

A.

The network layer headers and the session layer port numbers

B.

The presentation layer headers and the session layer port numbers

C.

The transport layer port numbers and the application layer headers

D.

The application layer port numbers and the transport layer headers

Questions # 158:

You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?

Options:

A.

Buesnarfing

B.

DOS

C.

The evil twin attack

D.

WAP cloning

Questions # 159:

Which of the following tools can be used for stress testing of a Web server?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Internet bots

B.

Spyware

C.

Anti-virus software

D.

Scripts

Questions # 160:

Which of the following is a virus that can redirect the disk head to read another sector instead of the one in which it resides?

Options:

A.

Multipartite virus

B.

Macro virus

C.

Stealth virus

D.

Boot sector virus

Questions # 161:

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?

Options:

A.

Land attack

B.

Internal attack

C.

DoS attack

D.

Reconnaissance attack

Questions # 162:

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Stick

B.

ADMutate

C.

Absinthe

D.

Fragroute

Questions # 163:

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cell Phones

B.

Individual scanners

C.

USB Drives

D.

Individual printers

Questions # 164:

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Strong data encryption during travel

B.

Firewall

C.

Anti-virus programs

D.

Strong authentication method

Questions # 165:

A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Disable ActiveX Controls

B.

Disable Active Scripting

C.

Implement File Integrity Auditing

D.

Configure Security Logs

Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.