Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following is a network protocol that allows data to be exchanged using a secure channel between two networked devices?

Options:

A.

SSL

B.

FTP

C.

SSH

D.

SFTP

Questions # 77:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

Question # 77

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

I LOVE YOU virus

B.

Nimda virus

C.

Chernobyl virus

D.

Melissa virus

Questions # 78:

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret

B.

Synchronous

C.

Asymmetric

D.

Symmetric

Questions # 79:

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric encryption

B.

Database encryption

C.

XML encryption

D.

Symmetric encryption

Questions # 80:

Which of the following viruses replaces the boot sector data with its own malicious code?

Options:

A.

Chernobyl

B.

Explore.Zip

C.

MBR

D.

Nimda

Questions # 81:

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

Options:

A.

I LOVE YOU

B.

Melissa

C.

Klez

D.

Boot sector

Questions # 82:

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks except for which one?

Options:

A.

Implement the IPP printing capability.

B.

Conduct frequent scans for server vulnerabilities.

C.

Install the upgrades of Microsoft service packs.

D.

Implement effective firewalls.

Questions # 83:

Which of the following is a popular replacement for halon gas?

Options:

A.

FM-200

B.

CO2

C.

SO2

D.

Ozone

Questions # 84:

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

Options:

A.

Rainbow attack

B.

SYN flood attack

C.

Zero Day attack

D.

FMS attack

Questions # 85:

Which of the following attacks can be performed by Brutus for cracking a password?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Hybrid attack

B.

Replay attack

C.

Brute force attack

D.

Man-in-the-middle attack

Questions # 86:

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

Questions # 87:

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Using personal firewall software on your Laptop.

B.

Using an IPSec enabled VPN for remote connectivity.

C.

Using portscanner like nmap in your network.

D.

Using a protocol analyzer on your Laptop to monitor for risks.

Questions # 88:

You are responsible for securing the network at a law firm. They are particularly interested in ensuring that sensitive documents are not disclosed to outside parties. In securing the printers and scanners, which of the following statements are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Wireless printers can be compromised by a hacker.

B.

Ghosting of documents is the only real security issue with scanners and copiers.

C.

Immediately after an image has been scanned you can 'ghost' that document/image.

D.

Secure hard drives in printers, since they can store copies of documents.

E.

Printers only have temporary data storage, so it is not possible to get data from a printer after a document is printed.

Questions # 89:

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Anti-x

B.

Snow.exe

C.

Image hide

D.

Stegbreak

Questions # 90:

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Dumpster diving

C.

Spam

D.

Encapsulation

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.