Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Management GSLC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam


785 Students Passed

86% Average Score

94% Same Questions
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following techniques is based on a set of criteria that has been acquired in a specific knowledge area or product area?

Options:

A.

Expert judgment

B.

Program Evaluation Review Technique (PERT) chart

C.

Function Point Analysis (FP Analysis)

D.

Delphi technique

Questions # 122:

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Direct

C.

Circumstantial

D.

Incontrovertible

Questions # 123:

You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.

The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.

Which of the following types of security attacks do you think it is?

Options:

A.

Social engineering

B.

Man-in-the-middle

C.

Hacking

D.

Spoofing

Questions # 124:

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

Options:

A.

Macro virus

B.

Stealth virus

C.

E-mail virus

D.

Polymorphic virus

Questions # 125:

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

Options:

A.

Soften

B.

Blur

C.

Sharpen

D.

Rotate

Questions # 126:

Tim is working as a project manager for the TCH project. The project is in the final stages and the closing processes are being performed. He has prepared the lessons learned document. This document will be the part of ____.

Options:

A.

The project's performance record

B.

The project charter

C.

The risk register

D.

The company's organizational process assets

Questions # 127:

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Active IDS

B.

Passive IDS

C.

Network-based IDS

D.

Signature-based IDS

Questions # 128:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

Question # 128

The e-mail that John has received is an example of __________.

Options:

A.

Social engineering attacks

B.

Virus hoaxes

C.

Spambots

D.

Chain letters

Questions # 129:

Which of the following work as traffic monitoring tools in the Linux operating system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPTraf

B.

Hotspotter

C.

Ntop

D.

John the Ripper

Questions # 130:

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC

B.

MAC

C.

RBAC

D.

DAC

Questions # 131:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:

A.

Your public key

B.

The recipient's private key

C.

The recipient's public key

D.

Your private key

Questions # 132:

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

Snort

B.

RealSecure

C.

Tripwire

D.

StealthWatch

Questions # 133:

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

Options:

A.

Containment

B.

Recovery

C.

Identification

D.

Eradication

Questions # 134:

Consider the following diagram:

Question # 134

What is the highlighted area of the diagram known as?

Options:

A.

Rule of Seven

B.

Control point

C.

Control chart

D.

Six Sigma

Questions # 135:

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide?

Each correct answer represents a complete solution. Choose two.

Options:

A.

DDoS attack

B.

IP spoofing attack

C.

MAC spoofing

D.

DNS cache poisoning

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.