Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following is used to detect malicious activity such as port scans or even attempts for cracking into computers by monitoring network traffic?

Options:

A.

IIPS

B.

NIDS

C.

PIDS

D.

HIDS

Questions # 47:

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Digest authentication is a more secure authentication method as compared to Basic authentication.

B.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

C.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

Questions # 48:

Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?

Options:

A.

Zero-day

B.

IP spoofing

C.

Brute force

D.

FMS

Questions # 49:

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical

B.

Technical

C.

Administrative

D.

Automatic

Questions # 50:

In which of the following does an attacker use multiple computers throughout the network that has been previously infected?

Options:

A.

Phishing

B.

DDOS

C.

DOS

D.

Sniffer

Questions # 51:

Which of the following terms refers to a prolonged loss of power?

Options:

A.

Spike

B.

Brownout

C.

Surge

D.

Blackout

Questions # 52:

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:

A.

AES

B.

DES

C.

RSA

D.

TripleDES

Questions # 53:

Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?

Options:

A.

NMap

B.

Domain tasting

C.

Proxy server

D.

PsPasswd

Questions # 54:

Which of the following is not a man-made threat?

Options:

A.

Tidal wave

B.

Vandalism

C.

Terrorism

D.

Theft

Questions # 55:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:

C:\whisker.pl -h target_IP_address

-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1

mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

B.

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.

This vulnerability helps in a cross site scripting attack.

D.

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Questions # 56:

Which of the following programs collects email addresses of users and creates a mailing list?

Options:

A.

Worms

B.

Stealth virus

C.

Boot virus

D.

Spambot

Questions # 57:

Which field is NOT defined while creating rules for the Network Honeypot rulebase?

Options:

A.

Response options

B.

Process mode

C.

Operation mode

D.

Notification options

Questions # 58:

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

Options:

A.

STP

B.

UDP

C.

TCP

D.

SNMP

Questions # 59:

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

Options:

A.

WinSSLMiM

B.

httprint

C.

ServerMask

D.

Whisker

Questions # 60:

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

TLS

C.

SNMP

D.

SSL

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.