Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Question # 106

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Questions # 107:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

• What ports are open on our network systems

• What hosts are available on the network

• Identify unauthorized wireless access points

• What services (application name and version) those hosts are offering

• What operating systems (and OS versions) they are running

• What type of packet filters/firewalls are in use

Which of the following tools is Victor using?

Options:

A.

Nmap

B.

Sniffer

C.

Kismet

D.

Nessus

Questions # 108:

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Magic Lantern

B.

Obiwan

C.

IPSec VPN

D.

SARA

Questions # 109:

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:

A.

Auditing

B.

Packet filtering

C.

Authentication

D.

Hacking

Questions # 110:

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer named SERVER1 with NTFS file system. SERVER1 has a 802.11 wireless LAN adapter. The Wireless LAN Service is installed on SERVER1. You want to know about the 802.11 wireless LAN interface information, network information, and wireless settings on the system on SERVER1.

Which of the following commands will you use to accomplish the task?

Options:

A.

netsh wlan show interfaces

B.

netsh wlan show all

C.

netsh wlan show settings

D.

netsh wlan show drivers

Questions # 111:

Roberta is the project manager of the KJL Project for her company. She is creating a chart that will help categorize the problems discovered during the quality control inspection process. She wants to create a chart where she can categorize the number of instances of problems and rank the problems based on frequency. Which chart should Roberta create?

Options:

A.

Pareto Chart

B.

Scatter diagram

C.

Fishbone diagram

D.

Control chart

Questions # 112:

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated.

In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections.

Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

Options:

A.

The laptop users will be able to use smart cards for getting authenticated.

B.

None of the tasks will be accomplished.

C.

Both tasks will be accomplished.

D.

The wireless network communication will be secured.

Questions # 113:

You work as an Exchange Administrator for McRobert Inc. You are configuring a new Exchange 2000 Server computer and two storage groups, group A and group B, on your network. You have to configure the physical disks on the Exchange 2000 Server computer to provide better performance and availability. Which configuration will you use to achieve this?

Options:

A.

Mirrored ---- Transaction Log Files (group A)

Mirrored ---- Transaction Log Files (group B)

RAID5 ------ Information store (groups A and B)

B.

Single drive ---- Transaction Log Files (group A)

Single drive ---- Transaction Log Files (group B)

RAID5 --------- Information Store (groups A and B)

C.

Mirrored ---- Transaction Log Files ( groups A and B)

RAID5 ------ Information Store (groups A and B)

D.

Single drive ----- Transaction Log Files (group A)

Single drive ----- Transaction Log Files (group B)

RAID5 ----------- Information Store (group A)

RAID5 ----------- Information Store (group B)

Questions # 114:

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms can exist inside files such as Word or Excel documents.

B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

C.

Worms replicate themselves from one system to another without using a host file.

D.

One feature of worms is keystroke logging.

Questions # 115:

What is the major difference between a worm and a Trojan horse?

Options:

A.

A worm is a form of malicious program, while a Trojan horse is a utility.

B.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

C.

A worm is self replicating, while a Trojan horse is not.

D.

A worm spreads via e-mail, while a Trojan horse does not.

Questions # 116:

You are the program manager of the JNH Program. Tom, a project manager in your program, has just completed his project and is ready to officially close his project. You agree that Tom's project is completed. What role do you play in Tom's project closure?

Options:

A.

You must ensure that that the projects within the program have been closed at the project level.

B.

You must ensure that the project sponsor closes the project.

C.

You must ensure that the program management team closes the project for the project manager.

D.

You must close the project before operations closes the project.

Questions # 117:

Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?

Options:

A.

SSL

B.

MS-CHAP v2

C.

EFS

D.

WEP

Questions # 118:

Which of the following viruses infects multiple targets?

Options:

A.

Macro virus

B.

Multipartite virus

C.

Polymorphic virus

D.

Stealth virus

Questions # 119:

Which of the following is the process of rewriting source and destination addresses of IP packets as they pass through a router or firewall?

Options:

A.

NAT

B.

Supernetting

C.

SNAT

D.

PAT

Questions # 120:

Which of the following uses public key cryptography to encrypt the contents of files?

Options:

A.

NTFS

B.

DFS

C.

RFS

D.

EFS

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.