Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following terms is synonymous with the willful destruction of another person's property?

Options:

A.

Spoofing

B.

Phishing

C.

Vandalism

D.

Hacking

Questions # 17:

Which of the following statements about reconnaissance is true?

Options:

A.

It is a computer that is used to attract potential intruders or attackers.

B.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

C.

It describes an attempt to transfer DNS zone data.

D.

It is also known as half-open scanning.

Questions # 18:

Which of the following tools can be used for the anti-phishing?

Options:

A.

Legion

B.

Spector

C.

Netcraft

D.

eblaster

Questions # 19:

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Pwdump

B.

EtherApe

C.

GFI LANguard

D.

Nessus

Questions # 20:

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.

Examining your firewall logs

B.

Examining your antivirus logs

C.

Examining your domain controller server logs

D.

Examining your DNS Server logs

Questions # 21:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

Options:

A.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

B.

The laptop will be able to access the wireless network but the security will be compromised.

C.

The WAP will allow the connection with the guest account's privileges.

D.

The laptop will not be able to access the wireless network.

Questions # 22:

John works as a Website Administrator in ABC Inc. The users of the company always use Internet Explorer for Web browsing. One of the users opens the Privacy tab page in the Internet Options dialog box and configures the privacy settings for the Internet zone as displayed in the following images:

Question # 22

Question # 22

Which of the following statements regarding the configurations are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

John has specifically blocked some websites from using cookies.

B.

John has set a privacy policy for websites in the Internet zone.

C.

John has specifically allowed some websites to use cookies.

D.

Hotmail.com and Yahoo.com will not use cookies regardless of their privacy policy.

Questions # 23:

Which of the following statements are true about an application-level gateway?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It allows client applications to use dynamic ephemeral TCP/UDP ports to communicate with the known ports used by the server applications.

B.

It does not allow customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application protocols.

C.

It is a security component that is added to a firewall or NAT employed in a computer network.

D.

It converts the network layer address information found inside an application payload. The hosts can be on either side of the firewall/NAT.

Questions # 24:

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Data classification

C.

Vulnerability assessments

D.

Data encryption

Questions # 25:

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

Options:

A.

They can be removed completely by taking proper actions.

B.

They can be analyzed and measured by the risk analysis process.

C.

They are considered an indicator of threats coupled with vulnerability.

D.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

Questions # 26:

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

Options:

A.

WPA-PSK

B.

WPA-EAP

C.

WPA2

D.

WEP

Questions # 27:

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

Questions # 28:

Which of the following attributes is a tool that does not aid the project manager in quality planning?

Options:

A.

Benchmarking practices

B.

Design of experiments

C.

Media selection

D.

Benefit of analysis

Questions # 29:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients.

The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

Options:

A.

Take the root CA offline after it issues certificates to its subordinate CAs.

B.

Take the subordinate CA offline after it gets the certificates from the root CA.

C.

Place all CA servers in a locked room.

D.

Configure a firewall on the network.

Questions # 30:

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:

A.

Stealth virus

B.

Multipartite virus

C.

File virus

D.

Polymorphic virus

E.

Boot sector virus

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.