Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GSLC GIAC Security Leadership Certification (GSLC) Questions and Answers

Questions 4

A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

Options:

A.

Add the identified risk to the issues log.

B.

Add the identified risk to a quality control management control chart.

C.

Add the identified risk to the low-level risk watchlist.

D.

Add the identified risk to the risk register.

Buy Now
Questions 5

Which of the following penetration testing phases involves reconnaissance or data gathering?

Options:

A.

Attack phase

B.

Post-attack phase

C.

Pre-attack phase

D.

Out-attack phase

Buy Now
Questions 6

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Changing keys often.

B.

Using the longest key supported by hardware.

C.

Using a 16 bit SSID.

D.

Using a non-obvious key.

Buy Now
Questions 7

An organization has a standardized change management plan that all project managers must adhere to. A project manager has worked with the Change Control Board in his organization to approve a change to project scope. What should the standardized change management plan require the project manager to do with the approved scope change?

Options:

A.

Perform risk assessment on the new change.

B.

Communicate the change to the vendor.

C.

Create a cost estimate for the change.

D.

Update the WBS.

Buy Now
Questions 8

According to the security requirements given in case study, which of the following security method should you implement to provide data security between NSILegal and NSIHR?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

IPSec with ESP

B.

EFS

C.

IPSec with AH

D.

Group Policies for shared folders

Buy Now
Questions 9

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Buy Now
Questions 10

You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.

The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.

Which of the following types of security attacks do you think it is?

Options:

A.

Social engineering

B.

Man-in-the-middle

C.

Hacking

D.

Spoofing

Buy Now
Questions 11

What is another term that can be assigned to the pre-program analysis and research to determine if a program should be initiated?

Options:

A.

Business case creation

B.

Feasibility study creation

C.

Program scope statement definition

D.

Program charter creation

Buy Now
Questions 12

Which of the following statements are true about SSIDs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

B.

SSIDs are case insensitive text strings and have a maximum length of 64 characters.

C.

SSID is used to identify a wireless network.

D.

Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

Buy Now
Questions 13

You work as a technician for Tech Perfect Inc. A user named Rick calls you. He wants to configure a wireless network for his small office. He wants to adopt a wireless technology that supports high data transfer speed. Which of the following technologies will you suggest?

Options:

A.

802.11b

B.

Infrared

C.

Bluetooth

D.

802.11

Buy Now
Questions 14

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

Options:

A.

It is likely to increase network traffic and slow down network performance.

B.

An unauthorized WAP is one way for hackers to get into a network.

C.

None, adding a wireless access point is a common task and not a security risk.

D.

This circumvents network intrusion detection.

Buy Now
Questions 15

Which of the following statements about front door attack is true?

Options:

A.

In this type of attack, the hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses a dictionary of common words to find out the password of a user.

C.

This type of attack is used to sniff passwords or information from a legitimate transaction to be used for the hacker's advantage.

D.

In this type of attack, the hacker has all the correct information to get into a system and does not have to perform any additional task to get that information.

Buy Now
Questions 16

Which of the following RAID levels will you use to implement a RAID system for providing fault tolerance to a database?

Options:

A.

RAID 10

B.

RAID 1

C.

RAID 5

D.

RAID 0

Buy Now
Questions 17

IDS systems can be classified in many different ways. Which of the following is not a way that IDS systems are commonly classified?

Options:

A.

Latent

B.

Network Based

C.

Passive

D.

Active

E.

Host Based

Buy Now
Questions 18

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Business continuity plan

C.

Contingency plan

D.

Continuity of Operations Plan

Buy Now
Questions 19

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The site should restrict the number of login attempts to only three times.

B.

The site should increase the encryption key length of the password.

C.

The site should use CAPTCHA after a specific number of failed login attempts.

D.

The site should force its users to change their passwords from time to time.

Buy Now
Questions 20

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret

B.

Synchronous

C.

Asymmetric

D.

Symmetric

Buy Now
Questions 21

Which of the following encrypts its code differently with each infection or generation of infections?

Options:

A.

Boot sector virus

B.

Stealth virus

C.

Polymorphic virus

D.

Macro virus

Buy Now
Questions 22

A user has opened a Web site that automatically starts downloading malicious code onto his computer.

What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Disable ActiveX Controls

B.

Disable Active Scripting

C.

Implement File Integrity Auditing

D.

Configure Security Logs

Buy Now
Questions 23

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:

C:\whisker.pl -h target_IP_address

-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1

mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

B.

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.

This vulnerability helps in a cross site scripting attack.

D.

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Buy Now
Questions 24

Which of the following is a model that uses a predefined set of access privileges for an object of the system?

Options:

A.

Mandatory Access Control (MAC)

B.

Discretionary Access Control (DAC)

C.

Policy Access Control (PAC)

D.

Role-Based Access Control (RBAC)

Buy Now
Questions 25

Which of the following is the rating for gasoline or oil fires?

Options:

A.

Class C

B.

Class B

C.

Class D

D.

Class A

Buy Now
Questions 26

Which of the following honeypots captures limited amounts of information, mainly transactional data and some limited interaction?

Options:

A.

Low-interaction

B.

High-interaction

C.

Network

D.

Medium-interaction

Buy Now
Questions 27

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of four domain controllers, six Windows 2003 member servers, and 500 Windows XP Professional client computers. The PKI infrastructure is already configured on the network. The current configuration of the network allows only managers to use EFS on local computers. Sometimes Mark faces problems when managers lose their private keys due to the user profile becoming corrupt or being lost. Due to this, the files that were persistently encrypted by using the corresponding public key are inaccessible. He wants to restore access to the encrypted files as quickly as possible. What will he do to accomplish the task?

Options:

A.

Ask the managers to log on to the network with a new user account.

B.

Rename all the encrypted files and ask the managers to open the files.

C.

Configure key archival on certificate authority (CA).

D.

Ask the managers to use the Distributed file system (Dfs) to encrypt important files.

Buy Now
Questions 28

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DES

B.

Blowfish

C.

IDEA

D.

RC4

Buy Now
Questions 29

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.

Examining your firewall logs

B.

Examining your antivirus logs

C.

Examining your domain controller server logs

D.

Examining your DNS Server logs

Buy Now
Questions 30

Which of the following terms describes the statement given below?

"It is a cryptographic protocol that provides security and data integrity for communications over networks such as the Internet."

Options:

A.

NTP

B.

SSH

C.

SNMP2/3

D.

TSL

Buy Now
Questions 31

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

Options:

A.

Snadboy's Revelation

B.

Kismet

C.

NetStumbler

D.

WEPCrack

Buy Now
Questions 32

You are configuring IPS (Intrusion Prevention System) on a Cisco IOS router. The IPS Policy Wizard window opens when you confirm the SDEE messages. Which of the following tasks can you perform using the IPS Policy Wizard window?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Select the direction of traffic for inspecting the events.

B.

Select an encryption method to improve security.

C.

Select the interface for applying the IPS rule.

D.

Select the SDF file which a user can use.

Buy Now
Questions 33

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 34

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

Options:

A.

Implement a network based IDS.

B.

Implement a passive IDS

C.

Implement a stateful packet inspection firewall.

D.

Implement a honey pot.

Buy Now
Questions 35

Fill in the blank with the appropriate term.

NOTE. Do not use abbreviation.

________ is a configurable client identification that allows a client to communicate with a particular base station.

Options:

Buy Now
Questions 36

Which of the following processes is described in the statement below?

"This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Identify Risks

B.

Perform Quantitative Risk Analysis

C.

Monitor and Control Risks

D.

Perform Qualitative Risk Analysis

Buy Now
Questions 37

Which of the following statements about reconnaissance is true?

Options:

A.

It is a computer that is used to attract potential intruders or attackers.

B.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

C.

It describes an attempt to transfer DNS zone data.

D.

It is also known as half-open scanning.

Buy Now
Questions 38

Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn't specifically ask for the added features. This scenario is an example of which one of the following?

Options:

A.

Scope creep

B.

Gold plating

C.

Change management

D.

Value added change

Buy Now
Questions 39

Which of the following is a virus that can redirect the disk head to read another sector instead of the one in which it resides?

Options:

A.

Multipartite virus

B.

Macro virus

C.

Stealth virus

D.

Boot sector virus

Buy Now
Questions 40

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you'll first need to understand all of the following except for which one?

Options:

A.

Summary milestone for the likely project phases

B.

Measurable project objectives and related success criteria

C.

Summary budget

D.

Quality improvement program your company uses

Buy Now
Questions 41

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

FTP server

B.

VPN

C.

Microsoft Internet Information Server (IIS)

D.

Certificate server

Buy Now
Questions 42

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:

HTTP

SSL

SSH

IPSec

Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSH

B.

SSL

C.

HTTP

D.

IPSec

Buy Now
Questions 43

Fill in the blank with the appropriate tool name.

________ is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.

Options:

Buy Now
Questions 44

Which of the following viruses/worms uses the buffer overflow attack?

Options:

A.

Code red worm

B.

Klez worm

C.

Nimda virus

D.

Chernobyl (CIH) virus

Buy Now
Questions 45

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Containment

B.

Eradication

C.

Identification

D.

Preparation

Buy Now
Questions 46

Which of the following features of IE prevent users from a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Pop-up blocker

B.

Cookie

C.

Content Advisor

D.

Phishing Filter

Buy Now
Questions 47

You are the project manager for your organization and are trying to determine which vendor your organization will use. You have determined that any vendor that would like to bid on your project work will need to have a Microsoft Certified System Engineer on staff, have eight years of Cisco experience, and have at least two references from similar projects. What have you created in this scenario?

Options:

A.

Screening system for the vendors

B.

Weighting system for the vendors

C.

Preferred vendors list

D.

Bidders conference

Buy Now
Questions 48

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kerberos requires continuous availability of a central server.

B.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

C.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.

D.

Kerberos requires the clocks of the involved hosts to be synchronized.

Buy Now
Questions 49

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.

ESP is always used in combination with Authentication Header (AH).

B.

ESP can encrypt data and verify data integrity.

C.

ESP is never used in combination with Authentication Header (AH).

D.

ESP only verifies data integrity.

Buy Now
Questions 50

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GSLC Question 50

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Buy Now
Questions 51

Which of the following features is used to generate spam on the Internet by spammers and worms?

Options:

A.

AutoFill

B.

SMTP relay

C.

Server Message Block (SMB) signing

D.

AutoComplete

Buy Now
Questions 52

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Building up an incident response kit

B.

Setting up the initial position after an incident

C.

Working with QA to validate security of the enterprise

D.

Organizing a solution to remove an incident

Buy Now
Questions 53

Which model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts?

Options:

A.

Spiral

B.

Prototyping

C.

View

D.

Waterfall

Buy Now
Questions 54

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Magic Lantern

B.

Obiwan

C.

IPSec VPN

D.

SARA

Buy Now
Questions 55

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:

A.

Internet Authentication Server

B.

Certificate User

C.

Certification Authority

D.

Domain Controller

Buy Now
Questions 56

You work as an Exchange Administrator for McRobert Inc. You are configuring a new Exchange 2000 Server computer and two storage groups, group A and group B, on your network. You have to configure the physical disks on the Exchange 2000 Server computer to provide better performance and availability. Which configuration will you use to achieve this?

Options:

A.

Mirrored ---- Transaction Log Files (group A)

Mirrored ---- Transaction Log Files (group B)

RAID5 ------ Information store (groups A and B)

B.

Single drive ---- Transaction Log Files (group A)

Single drive ---- Transaction Log Files (group B)

RAID5 --------- Information Store (groups A and B)

C.

Mirrored ---- Transaction Log Files ( groups A and B)

RAID5 ------ Information Store (groups A and B)

D.

Single drive ----- Transaction Log Files (group A)

Single drive ----- Transaction Log Files (group B)

RAID5 ----------- Information Store (group A)

RAID5 ----------- Information Store (group B)

Buy Now
Questions 57

Nancy is the project manager for a new construction project. There are several occupational safety codes, which must be included in the project requirements. These requirements are nonnegotiable and the customer must pay for the safety measures, inspections, and training for the project team. What term best describes the cost associated with these safety requirements?

Options:

A.

Cost of quality

B.

Cost of doing business

C.

Cost of risk avoidance

D.

Cost of risk mitigation

Buy Now
Questions 58

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

Options:

A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

Buy Now
Questions 59

In which of the following does an attacker use multiple computers throughout the network that has been previously infected?

Options:

A.

Phishing

B.

DDOS

C.

DOS

D.

Sniffer

Buy Now
Questions 60

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

TLS

C.

SNMP

D.

SSL

Buy Now
Questions 61

Rick works as the Network Administrator of a Windows 2000 network. The network consists of 30 domain controllers, 65 member servers, and 5000 workstations. All the computers on the network use Windows 2000 Advanced Server, Windows 2000 Server, and Windows 2000 Professional operating systems. The Windows 2000 Advanced Server computers are running the Cluster Service. The network uses TCP/IP as its only protocol. Once a week Rick works from home. But rest of the weekdays, he has to travel. Rick wants to be able to remotely administer each Windows 2000 server on his network with the following considerations:

• He must be able to establish a VPN connection to the Windows 2000 Server computers on the network from his home, so that the data remain encrypted and encapsulated during data transfer.

• While traveling , he must be able to connect to the network from a laptop computer via remote access connection, so that he can perform any task on the main Windows 2000 domain controller.

• While traveling, he must be able to edit the registry of the Windows 2000 Server computer.

• During the migration process to Windows 2000, he depleted all the financial resources for licensing. Therefore, he must not be required to add additional licenses to the network.

Rick takes the following actions:

• He implements the VPN connection on the proper server, the laptop computer, and the home computer.

• He configures the VPN connection to use the IPSec protocol in Encapsulating Security Payload (ESP) Tunnel Mode.

• He implements Windows 2000 Terminal Services using the Remote Administration mode on the Windows 2000 servers.

• He installs and configures Routing and Remote Access properly.

Which of the following goals will be accomplished by these actions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

While traveling, he will be able to connect to the network from a laptop computer via remote access connection so that he can perform any task on the main Windows 2000 domain controller.

B.

While traveling, he will be able to edit the registry of the Windows 2000 Server computer.

C.

He will not be required to add additional licenses to the network.

D.

He will be able to establish a VPN connection to the Windows 2000 Server computers on the network from his home, so that the data remains encrypted and encapsulated during data transfer.

Buy Now
Questions 62

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

Options:

A.

STP

B.

UDP

C.

TCP

D.

SNMP

Buy Now
Questions 63

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

SCP protocol

B.

Packet sniffing

C.

Rootkit

D.

ICMP

Buy Now
Questions 64

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

DNS zone transfer

B.

SNMP enumeration

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Questions 65

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sudden reduction in system resources.

B.

Corrupted or missing files.

C.

Unclear monitor display.

D.

Faster read/write access of the CD-ROM drive.

Buy Now
Questions 66

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric encryption

B.

Database encryption

C.

XML encryption

D.

Symmetric encryption

Buy Now
Questions 67

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 68

Which wireless security protocol is also known as IEEE 802.11i?

Options:

A.

WPA2

B.

WEP

C.

TKIP

D.

EAP

Buy Now
Questions 69

Which of the following is the best way of protecting important data against virus attack?

Options:

A.

Using strong passwords to log on to the network.

B.

Taking daily backup of data.

C.

Updating the anti-virus software regularly.

D.

Implementing a firewall

Buy Now
Questions 70

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

Options:

A.

Application-level gateway

B.

Proxy server

C.

Firewall

D.

DMZ

Buy Now
Questions 71

Donna, a stakeholder in your project to create new software, has approached you about adding some features to the software package. You instruct that Donna must document the change request for it to be considered for the project. Why is it important for Donna to document the change request?

Options:

A.

The documentation of the change request ensures that there's an audit trail of the request change from the requestor to the implementation and verification of the request.

B.

The documentation of the change request allows Donna to really understand all of the requirements for the change to be entered into the project scope.

C.

It's really not that important but it will delay the request for the change or prevent the change from entering the change control system at all.

D.

The documentation of the change request ensures that Donna is the stakeholder that will pay for the request.

Buy Now
Questions 72

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms can exist inside files such as Word or Excel documents.

B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

C.

Worms replicate themselves from one system to another without using a host file.

D.

One feature of worms is keystroke logging.

Buy Now
Questions 73

In which of the following techniques does an attacker change the address of the phishing site in such a manner that it can bypass filters or other application defenses that have been put in place to block specific IP addresses?

Options:

A.

Dumpster diving

B.

Reverse social engineering

C.

Shoulder surfing

D.

URL obfuscation

Buy Now
Questions 74

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

Options:

A.

Project Integration Management

B.

Project Time Management

C.

Project Scope Management

D.

Project Risk Management

Buy Now
Questions 75

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use SMART model

C.

Use OODA loop

D.

Use Information assurance

Buy Now
Questions 76

Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

Options:

A.

Macro

B.

Polymorphic

C.

Logic Bomb

D.

Boot sector

Buy Now
Questions 77

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:

A.

Auditing

B.

Packet filtering

C.

Authentication

D.

Hacking

Buy Now
Questions 78

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Broadcast storm

B.

DoS attack

C.

Password sniffing

D.

IP spoofing

Buy Now
Questions 79

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

Options:

A.

Black-box testing

B.

White-box testing

C.

Unit testing

D.

Gray-box testing

Buy Now
Questions 80

You are the project manager for the GHY Organization. A stakeholder has presented a change to your project that will cause the project scope to increase considerably. You are considering the change for approval and you need to review the impact of the change on all areas of the project. What change control system component is responsible for guiding the review of the impact of all changes on the project management knowledge areas?

Options:

A.

Scope change control system

B.

Change control system

C.

Configuration management

D.

Integrated change control

Buy Now
Questions 81

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients.

The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

Options:

A.

Take the root CA offline after it issues certificates to its subordinate CAs.

B.

Take the subordinate CA offline after it gets the certificates from the root CA.

C.

Place all CA servers in a locked room.

D.

Configure a firewall on the network.

Buy Now
Questions 82

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Vulnerability attack

B.

Denial-of-Service attack

C.

Impersonation attack

D.

Social Engineering attack

Buy Now
Questions 83

A management workstation collects and connects events from multiple IPS sensors in the network.

Which protocol is used in this process?

Options:

A.

SNMP

B.

SCCP

C.

SRTP

D.

SDEE

Buy Now
Questions 84

Place the processes that are grouped under the Project Cost Management Knowledge Area in the image below.

GSLC Question 84

GSLC Question 84

Options:

A.
Buy Now
Questions 85

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher.

Which of the following techniques will she use to fulfill this requirement?

Options:

A.

DES

B.

AES

C.

PGP

D.

IDEA

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Jun 30, 2025
Questions: 567

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GSLC testing engine

PDF (Q&A)

$36.75  $104.99
buy now GSLC pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Jul 2025