Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following standards is also known as IEEE 802.11i?

Options:

A.

Wi-Fi Protected Access 2 (WPA2)

B.

Wi-Fi Protected Access (WPA)

C.

Wired Equivalent Privacy (WEP)

D.

Wireless Access Protocol (WAP)

Questions # 62:

You work as a Network Administrator in a company. The NIDS is implemented on the network. You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

Options:

A.

Half duplex

B.

Promiscuous

C.

Full Duplex

D.

Audit mode

Questions # 63:

You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure. Which of the following tools can you use to accomplish the task?

Options:

A.

Whisker

B.

WinSSLMiM

C.

httprint

D.

Wget

Questions # 64:

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Code red

B.

Beast

C.

Klez

D.

SQL Slammer

Questions # 65:

Which of the following is a physical or logical subnetwork that contains and exposes external services of an organization to a larger network, usually the Internet?

Options:

A.

NAT

B.

Firewall

C.

DMZ

D.

VLAN

Questions # 66:

Which of the following is the default security level for the Internet zone?

Options:

A.

Medium

B.

High

C.

Low

D.

Medium-Low

Questions # 67:

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sudden reduction in system resources.

B.

Corrupted or missing files.

C.

Unclear monitor display.

D.

Faster read/write access of the CD-ROM drive.

Questions # 68:

Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?

Options:

A.

IWA

B.

Digest authentication

C.

MPA

D.

SPAP

Questions # 69:

In which technique are phases overlapped that would normally be done in sequence?

Options:

A.

Critical path

B.

Lead time

C.

Fast tracking

D.

Project tracking

Questions # 70:

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

C.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

D.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

Questions # 71:

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:

A.

RSA

B.

TripleDES

C.

DES

D.

AES

Questions # 72:

Which of the following colors is used for ultra secret information?

Options:

A.

Yellow

B.

Blue

C.

Red

D.

Orange

Questions # 73:

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Demilitarized zone (DMZ)

C.

Packet filtering

D.

Firewall

Questions # 74:

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Questions # 75:

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

Options:

A.

An example of IP spoofing.

B.

A backdoor the intruder created so that he can re-enter the network.

C.

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

D.

An example of privilege escalation.

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.