Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Cryptanalysis

B.

Spoofing

C.

Packet sniffing

D.

Steganography

Questions # 92:

You work as a Network Administrator for PassGuide Inc. You have been assigned a task to provide the right authentications to users. Which method that uses a KDC will you use to accomplish the task?

Options:

A.

Biometrics

B.

Basic authentication

C.

Digest authentication

D.

Kerberos

Questions # 93:

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Options:

A.

18 U.S.C. 2510

B.

18 U.S.C. 1362

C.

18 U.S.C. 1030

D.

18 U.S.C. 2701

E.

18 U.S.C. 1029

Questions # 94:

Fill in the blank with the appropriate term.

____________is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Options:

Questions # 95:

Donna, a stakeholder in your project to create new software, has approached you about adding some features to the software package. You instruct that Donna must document the change request for it to be considered for the project. Why is it important for Donna to document the change request?

Options:

A.

The documentation of the change request ensures that there's an audit trail of the request change from the requestor to the implementation and verification of the request.

B.

The documentation of the change request allows Donna to really understand all of the requirements for the change to be entered into the project scope.

C.

It's really not that important but it will delay the request for the change or prevent the change from entering the change control system at all.

D.

The documentation of the change request ensures that Donna is the stakeholder that will pay for the request.

Questions # 96:

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Trojan horse

B.

Worm

C.

Biometrics

D.

Denial-of-Service (DoS)

Questions # 97:

Which of the following tools is used to hide secret data in text files and is based on the concept that spaces and tabs are generally not visible in text viewers and therefore a message can be effectively hidden without affecting the text's visual representation for the casual observer?

Options:

A.

SARA

B.

Snow.exe

C.

Fpipe

D.

Image hide

Questions # 98:

Which of the following attacks is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker?

Options:

A.

Adaptive chosen-ciphertext

B.

Chosen-ciphertext

C.

Chosen-plain-supermodel

D.

Related-key

Questions # 99:

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSHGuard

B.

portsentry

C.

OpenSSL

D.

nmap

E.

Fail2Ban

Questions # 100:

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card?

Each correct answer represents a complete solution. Choose two.

Options:

A.

These tools can determine the authorization status of an access point.

B.

These tools cannot detect rogue access points if the victim is using data encryption.

C.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

D.

These tools can determine the rogue access point even when it is attached to a wired network.

Questions # 101:

Managerial wisdom is the combination of knowledge as well as experience. It is the ability of the leaders to understand the members of the team. Which of the following are the characteristics that come under managerial wisdom?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dominating

B.

Simple

C.

Values

D.

Listener

Questions # 102:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:

A.

The recipient's public key

B.

Your private key

C.

The recipient's private key

D.

Your public key

Questions # 103:

You are the project manager of the Workstation Improvement Project for your organization. This project will replace 925 workstations with new computers for your company's employees. Mark Jones, the sales manager, has requested that your project add 250 laptops as part of this project as his employees do not have workstations as they travel as part of the sales process. Mark insists that his department in the company can pay for the cost of the laptops. All of the following are components that will be affected by this change request except for which one?

Options:

A.

There will be a need for additional time to install the laptops.

B.

There will be a need for an additional project scope statement because of the change request.

C.

There will be a need for additional procurement management processes.

D.

There will be a need for additional risk analysis for the laptops.

Questions # 104:

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. All client computers on the network run Windows XP Professional.

You configure a public key infrastructure (PKI) on the network. You configure a root CA and a subordinate CA on the network. For security reasons, you want to take the root CA offline. You are required to configure the CA servers to support for certificate revocation. Choose the steps you will require to accomplish the task.

Question # 104

Options:

A.
Questions # 105:

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Options:

A.

Network anti-spyware software

B.

Protocol analyzers

C.

Network anti-virus software

D.

Site surveys

Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.