Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GSLC GIAC Security Leadership Certification (GSLC) Questions and Answers

Questions 4

You are responsible for network security at a defense contractor. You are very concerned about sensitive data not getting out of your network. You have specific concerns about employees or contractors sending out files via FTP, or even spyware sending out data. You have blocked and monitored ports (as many as you can) on your firewall, and of course, run an anti spyware package.

Which of the following is another step you should take in preventing sensitive data from being sent out of your network without authorization?

Options:

A.

Implement an IDS.

B.

Utilize a DMZ firewall.

C.

Block all employees from emailing outside your network.

D.

Employ network wide anti virus.

Buy Now
Questions 5

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company ' s network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B.

Black box testing simulates an attack from someone who is familiar with the system.

C.

Black box testing simulates an attack from someone who is unfamiliar with the system.

D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.

Buy Now
Questions 6

Place the processes that are grouped under the Project Cost Management Knowledge Area in the image below.

GSLC Question 6

GSLC Question 6

Options:

A.
Buy Now
Questions 7

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

mysql_escape_string()

B.

session_regenerate_id()

C.

mysql_real_escape_string()

D.

Prepared statement

Buy Now
Questions 8

Which of the following contract types is described in the statement below?

" This contract type provides no incentive for the contractor to control costs and hence is rarely utilized. "

Options:

A.

Cost Plus Fixed Fee

B.

Cost Plus Award Fee

C.

Cost Plus Incentive Fee

D.

Cost Plus Percentage of Cost

Buy Now
Questions 9

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WEP uses the RC4 encryption algorithm.

B.

Automated tools such as AirSnort are available for discovering WEP keys.

C.

It provides better security than the Wi-Fi Protected Access protocol.

D.

The Initialization Vector (IV) field of WEP is only 24 bits long.

Buy Now
Questions 10

All of the following are the password cracking attacks performed by the cain tool except for which one?

Options:

A.

Brute force attack

B.

Dictionary attack

C.

DoS attack

D.

Rainbow attack

Buy Now
Questions 11

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:

A.

Keyword

B.

Cookie

C.

Protocol

D.

ActiveX control

Buy Now
Questions 12

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Reconnaissance

B.

Maintaining access

C.

Covering tracks

D.

Gaining access

Buy Now
Questions 13

David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

Options:

A.

Striped volume

B.

Spanned volume

C.

RAID-5 volume

D.

Mirrored volume

Buy Now
Questions 14

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

2Mosaic

B.

Gifshuffle

C.

Active Attacks

D.

Steg-Only Attack

Buy Now
Questions 15

Which of the following functions can you use to mitigate a command injection attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

escapeshellcmd()

B.

escapeshellarg()

C.

htmlentities()

D.

strip_tags()

Buy Now
Questions 16

John works as a network security officer in Gentech Inc. The company uses a TCP/IP network. While working on the network, a problem occurs related to the DNS resolution. Which of the following utilities can he use to diagnose the problem?

Options:

A.

IPConfig

B.

Ping

C.

Tracert

D.

nslookup

Buy Now
Questions 17

Which function of incident handling involves in-depth investigation of the incident report or incident activity to establish the priority and threat of the incident?

Options:

A.

Incident analysis

B.

Incident reporting

C.

Incident response

D.

Incident identification

Buy Now
Questions 18

Which of the following is used to authenticate asymmetric keys?

Options:

A.

MAC Address

B.

Digital signature

C.

Demilitarized zone (DMZ)

D.

Password

Buy Now
Questions 19

Which of the following is used to identify a particular 802.11 wireless LAN?

Options:

A.

Basic Service Set (BSS)

B.

Basic Service Set Identifier (BSSID)

C.

Independent Basic Service Set (IBSS)

D.

Service Set Identifier (SSID)

Buy Now
Questions 20

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

F936.28A1.5BCD.DEFA

B.

1011-0011-1010-1110-1100-0001

C.

132.298.1.23

D.

A3-07-B9-E3-BC-F9

Buy Now
Questions 21

Rick works as the Network Administrator of a Windows 2000 network. The network consists of 30 domain controllers, 65 member servers, and 5000 workstations. All the computers on the network use Windows 2000 Advanced Server, Windows 2000 Server, and Windows 2000 Professional operating systems. The Windows 2000 Advanced Server computers are running the Cluster Service. The network uses TCP/IP as its only protocol. Once a week Rick works from home. But rest of the weekdays, he has to travel. Rick wants to be able to remotely administer each Windows 2000 server on his network with the following considerations:

• He must be able to establish a VPN connection to the Windows 2000 Server computers on the network from his home, so that the data remain encrypted and encapsulated during data transfer.

• While traveling , he must be able to connect to the network from a laptop computer via remote access connection, so that he can perform any task on the main Windows 2000 domain controller.

• While traveling, he must be able to edit the registry of the Windows 2000 Server computer.

• During the migration process to Windows 2000, he depleted all the financial resources for licensing. Therefore, he must not be required to add additional licenses to the network.

Rick takes the following actions:

• He implements the VPN connection on the proper server, the laptop computer, and the home computer.

• He configures the VPN connection to use the IPSec protocol in Encapsulating Security Payload (ESP) Tunnel Mode.

• He implements Windows 2000 Terminal Services using the Remote Administration mode on the Windows 2000 servers.

• He installs and configures Routing and Remote Access properly.

Which of the following goals will be accomplished by these actions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

While traveling, he will be able to connect to the network from a laptop computer via remote access connection so that he can perform any task on the main Windows 2000 domain controller.

B.

While traveling, he will be able to edit the registry of the Windows 2000 Server computer.

C.

He will not be required to add additional licenses to the network.

D.

He will be able to establish a VPN connection to the Windows 2000 Server computers on the network from his home, so that the data remains encrypted and encapsulated during data transfer.

Buy Now
Questions 22

John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company ' s Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

Social engineering

B.

DoS

C.

Trojan horse

D.

Replay attack

Buy Now
Questions 23

Which of the following programs collects email addresses of users and creates a mailing list?

Options:

A.

Worms

B.

Stealth virus

C.

Boot virus

D.

Spambot

Buy Now
Questions 24

Which of the following standards is also known as IEEE 802.11i?

Options:

A.

Wi-Fi Protected Access 2 (WPA2)

B.

Wi-Fi Protected Access (WPA)

C.

Wired Equivalent Privacy (WEP)

D.

Wireless Access Protocol (WAP)

Buy Now
Questions 25

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Digest authentication is a more secure authentication method as compared to Basic authentication.

B.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

C.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

Buy Now
Questions 26

Which of the following statements are true about WPA?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WPA provides better security than WEP.

B.

Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.

C.

WPA-PSK converts the passphrase into a 256-bit key.

D.

WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.

Buy Now
Questions 27

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf

B.

Denial of Service

C.

Virus

D.

Evil Twin

Buy Now
Questions 28

You are a project manager who is completing a project for another organization. The project you are managing will have phased deliverables throughout the project. Stakeholders are required to complete scope validation at the end of each phase so that the project can move forward. Your payment requests will also be attached to the approval of each phase so it is important to you, on several levels, that the stakeholders participate in scope validation as soon as they are requested. You have documented the process for reviewing the product acceptance criteria with the stakeholders.

What project document details the product acceptance criteria in all the projects?

Options:

A.

Statement of Work

B.

Project scope statement

C.

Project management plan

D.

Contract

Buy Now
Questions 29

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Options:

A.

PDA Hijacking

B.

Session Hijacking

C.

Privilege Escalation

D.

Bluesnarfing

Buy Now
Questions 30

Which of the following is a cryptographic approach employed by many cryptographic algorithms and cryptosystems?

Options:

A.

Symmetric-key cryptography

B.

Public-key cryptography

C.

Asymmetric-key cryptography

D.

Quantum cryptography

Buy Now
Questions 31

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Digest authentication is a more secure authentication method as compared to Basic authentication.

B.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

C.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

Buy Now
Questions 32

Which of the following heights of fence deters only casual trespassers?

Options:

A.

3 to 4 feet

B.

8 feet

C.

2 to 2.5 feet

D.

6 to 7 feet

Buy Now
Questions 33

In which type of person-to-person attack does an attacker pretend to be someone else?

Options:

A.

In Person Attack

B.

Important User Posing

C.

Impersonation

D.

Third-Party Authorization

Buy Now
Questions 34

Which of the following is a computer file used in an operating system to map hostnames to IP addresses?

Options:

A.

LMHOSTS file

B.

NSCD.CONF file

C.

TMPFS file

D.

HOSTS file

Buy Now
Questions 35

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

DNS zone transfer

B.

SNMP enumeration

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Questions 36

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Options:

A.

Dictionary attack

B.

Man-in-the-middle attack

C.

Denial-of-service attack

D.

Password guessing attack

Buy Now
Questions 37

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:

A.

Stealth virus

B.

Multipartite virus

C.

File virus

D.

Polymorphic virus

E.

Boot sector virus

Buy Now
Questions 38

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

ICMP

B.

SCP protocol

C.

Rootkit

D.

Packet sniffing

Buy Now
Questions 39

Which of the following sections come under the ISO/IEC 27002 standard?

Options:

A.

Financial assessment

B.

Security policy

C.

Risk assessment

D.

Asset management

Buy Now
Questions 40

You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.

The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.

Which of the following types of security attacks do you think it is?

Options:

A.

Social engineering

B.

Man-in-the-middle

C.

Hacking

D.

Spoofing

Buy Now
Questions 41

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses asymmetric key pairs.

B.

It uses symmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It is a digital representation of information that identifies users.

Buy Now
Questions 42

Mark works as a Network Administrator for BlueWell Inc. While surfing the Internet, he enters a URL http://www.ciw.com/web/learning in the Web browser. A Web page appears after entering the URL. Which of the following protocols can be used to resolve www.ciw.com into the correct IP address?

Options:

A.

DNS

B.

SMTP

C.

DHCP

D.

ARP

Buy Now
Questions 43

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms can exist inside files such as Word or Excel documents.

B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

C.

Worms replicate themselves from one system to another without using a host file.

D.

One feature of worms is keystroke logging.

Buy Now
Questions 44

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

Options:

A.

Application-level gateway

B.

Proxy server

C.

Firewall

D.

DMZ

Buy Now
Questions 45

Roberta is the project manager of the KJL Project for her company. She is creating a chart that will help categorize the problems discovered during the quality control inspection process. She wants to create a chart where she can categorize the number of instances of problems and rank the problems based on frequency. Which chart should Roberta create?

Options:

A.

Pareto Chart

B.

Scatter diagram

C.

Fishbone diagram

D.

Control chart

Buy Now
Questions 46

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cell Phones

B.

Individual scanners

C.

USB Drives

D.

Individual printers

Buy Now
Questions 47

In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

Options:

A.

Polymorphic shell code attack

B.

IP address spoofing

C.

Cross-site request forgery

D.

Rainbow attack

Buy Now
Questions 48

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook ' s preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

C.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

D.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = " file and pathname of the WAB file "

Buy Now
Questions 49

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.

Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The site should force its users to change their passwords from time to time.

B.

The site should use CAPTCHA after a specific number of failed login attempts.

C.

The site should increase the encryption key length of the password.

D.

The site should restrict the number of login attempts to only three times.

Buy Now
Questions 50

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

Options:

A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

Buy Now
Questions 51

Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?

Options:

A.

Brute force

B.

Zero-day

C.

FMS

D.

IP spoofing

Buy Now
Questions 52

Which of the following is a read-only copy of a zone and obtains its resource records from other name servers?

Options:

A.

Secondary zone

B.

Primary zone

C.

Stub zone

D.

SOA zone

Buy Now
Questions 53

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

Options:

A.

I LOVE YOU

B.

Melissa

C.

Klez

D.

Boot sector

Buy Now
Questions 54

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric encryption

B.

Database encryption

C.

XML encryption

D.

Symmetric encryption

Buy Now
Questions 55

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MAC filtering on the router

B.

Strong password policies on workstations.

C.

Not broadcasting SSID

D.

Using either WEP or WPA encryption

E.

Hardening the server OS

Buy Now
Questions 56

Which of the following malware spread through the Internet and caused a large DoS attack in

1988?

Options:

A.

Morris worm

B.

LoveLetter worm

C.

SQL slammer worm

D.

Klez worm

Buy Now
Questions 57

Which of the following algorithms can be used to check the integrity of a file?

Each correct answer represents a complete solution. Choose two.

Options:

A.

sha

B.

blowfish

C.

md5

D.

rsa

Buy Now
Questions 58

Which of the following wireless standards has a transmission speed of up to 720 Kbps?

Options:

A.

IEEE 802.11a

B.

Infrared

C.

Bluetooth

D.

Wi-Fi

Buy Now
Questions 59

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The attacker can exploit any protocol used to go into the internal network or intranet of the company.

B.

The attacker can perform a Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

C.

The attacker can gain access to the Web server in a DMZ and exploit the database.

D.

The attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

Buy Now
Questions 60

Which of the following authentication methods is used to enable a Web browser to provide credentials when making a request during an HTTP transaction?

Options:

A.

Anonymous authentication

B.

Basic authentication

C.

Digest authentication

D.

Integrated Windows authentication

Buy Now
Questions 61

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Contamination

B.

Eradication

C.

Recovery

D.

Identification

E.

Preparation

Buy Now
Questions 62

Andrew works as a Software Developer for Mansoft Inc. The company ' s network has a Web server that hosts the company ' s Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPSec

B.

Symmetric

C.

Secret

D.

Asymmetric

Buy Now
Questions 63

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We-are- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error ' 0x80040E14 '

This error message shows that the We-are-secure Website is vulnerable to __________.

Options:

A.

A buffer overflow

B.

An XSS attack

C.

A SQL injection attack

D.

A Denial-of-Service attack

Buy Now
Questions 64

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Pwdump

B.

EtherApe

C.

GFI LANguard

D.

Nessus

Buy Now
Questions 65

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

Options:

A.

Fixed Price with Economic Price Adjustment

B.

Fixed Price Incentive Fee

C.

Cost Plus Fixed Fee Contract

D.

Firm Fixed Price

Buy Now
Questions 66

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

File-based

B.

Anomaly-based

C.

Signature-based

D.

Network-based

Buy Now
Questions 67

Which of the following statements about a certification authority (CA) is true?

Options:

A.

It is a non-profit organization that sets security standards for e-commerce.

B.

It issues physical certificates that confirm the identity of entities.

C.

It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

D.

It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

Buy Now
Questions 68

You have inserted a Trojan on your friend ' s computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

Buy Now
Questions 69

Your company network has been infected with a virus. You have cleaned all PCs, workstations, and servers. However your network still keeps getting re-infected with the same virus. Which of the following could NOT be a cause for this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

The virus is on UPS devices.

B.

Users are downloading the virus from emails.

C.

The virus is on printers.

D.

The virus has infected your network interface cards.

E.

Users have the virus on portable media such as a USB drive.

Buy Now
Questions 70

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher.

Which of the following techniques will she use to fulfill this requirement?

Options:

A.

DES

B.

AES

C.

PGP

D.

IDEA

Buy Now
Questions 71

You are the project manager of the NJJ project. Your enterprise environmental factors require that you establish certain risk management rules regarding low risks within your project. What is the best policy for risks with low probability and low impact in the project management?

Options:

A.

These risks should be placed in the risk register.

B.

These risks should be identified, but dismissed.

C.

These risks should be accepted.

D.

These risks should be placed on a watchlist for future monitoring.

Buy Now
Questions 72

Which of the following penetration testing phases involves reconnaissance or data gathering?

Options:

A.

Attack phase

B.

Post-attack phase

C.

Pre-attack phase

D.

Out-attack phase

Buy Now
Questions 73

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Brute force attack

B.

Mail bombing

C.

Dictionary attack

D.

Spoofing

Buy Now
Questions 74

Which of the following attacks does Management Frame Protection help to mitigate?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Replay attack

B.

DoS attack

C.

DDoS attack

D.

Man-in-the-middle attack

Buy Now
Questions 75

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

Options:

A.

Spambots

B.

Logic bombs

C.

Chain letters

D.

Virus hoaxes

E.

Time bombs

Buy Now
Questions 76

Which of the following DNS servers provides fault tolerance, load distribution, and easier remote name resolution for the primary DNS server?

Options:

A.

Forwarding server

B.

Root server

C.

Caching-only server

D.

Slave server

Buy Now
Questions 77

Which key of the Asymmetric encryption is used to encrypt the data when a user sends a message or data to another user?

Options:

A.

Symmetric

B.

Private

C.

Public

D.

Asymmetric

Buy Now
Questions 78

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn ' t know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

Options:

A.

Replay attack

B.

Social Engineering attack

C.

Brute Force attack

D.

War dialing attack

Buy Now
Questions 79

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Exposure Factor (EF)

C.

Annualized Rate of Occurrence (ARO)

D.

Safeguard

Buy Now
Questions 80

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company ' s network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients.

The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

Options:

A.

Take the root CA offline after it issues certificates to its subordinate CAs.

B.

Take the subordinate CA offline after it gets the certificates from the root CA.

C.

Place all CA servers in a locked room.

D.

Configure a firewall on the network.

Buy Now
Questions 81

Maria works as a Risk Analysis Manager for Gentech Inc. She starts a new IT project. Which of the following phases of her project development process is most suitable for including risk analysis?

Options:

A.

Implementation planning

B.

Project initiation

C.

System construction

D.

Requirements definition

Buy Now
Questions 82

Which of the following security protocols can be used to support MS-CHAPv2 for wireless client authentication?

Each correct answer represents a complete solution. Choose two.

Options:

A.

HTTP

B.

PEAP

C.

IPSec

D.

PPTP

Buy Now
Questions 83

Which of the following statements about reconnaissance is true?

Options:

A.

It is a computer that is used to attract potential intruders or attackers.

B.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

C.

It describes an attempt to transfer DNS zone data.

D.

It is also known as half-open scanning.

Buy Now
Questions 84

In which of the following social engineering attacks does an attacker first damage any part of the target ' s equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Impersonation attack

B.

In person attack

C.

Important user posing attack

D.

Reverse social engineering attack

Buy Now
Questions 85

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Demilitarized zone (DMZ)

C.

Packet filtering

D.

Firewall

Buy Now
Questions 86

In which of the following does a project manager assign certain points towards various categories to judge the vendors?

Options:

A.

Project plan

B.

Project analysis

C.

Screening system

D.

Weighting system

Buy Now
Questions 87

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor ' s computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 88

Which of the following port numbers is used by the LDAP protocol when it is secured?

Options:

A.

335

B.

120

C.

442

D.

636

Buy Now
Questions 89

Which of the following attacks can be performed by Brutus for cracking a password?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Hybrid attack

B.

Replay attack

C.

Brute force attack

D.

Man-in-the-middle attack

Buy Now
Questions 90

Which of the following is a valid space efficiency of RAID 3?

Options:

A.

1 - 1/n

B.

1/n

C.

1 - 2/n

D.

1

Buy Now
Questions 91

All of the following are the outputs of the Acquire Project Team process except for which one?

Options:

A.

Resource calendars

B.

Enterprise environmental factors

C.

Project staff assignments

D.

Project management plan updates

Buy Now
Questions 92

Which of the following is the default security level for the Internet zone?

Options:

A.

Medium

B.

High

C.

Low

D.

Medium-Low

Buy Now
Questions 93

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sudden reduction in system resources.

B.

Corrupted or missing files.

C.

Unclear monitor display.

D.

Faster read/write access of the CD-ROM drive.

Buy Now
Questions 94

What do spikes in a power line indicate?

Options:

A.

Interference superimposed onto the power line

B.

Momentary high voltage

C.

Prolonged loss of power

D.

Momentary low voltage

Buy Now
Questions 95

An IPS sensor triggers an alarm known as " signature firing " . What events may occur in response?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Attacker ' s IP address is blocked

B.

Unauthorized packets are dropped

C.

A log entry is Created

D.

TCP connection is reset

Buy Now
Questions 96

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks except for which one?

Options:

A.

Implement the IPP printing capability.

B.

Conduct frequent scans for server vulnerabilities.

C.

Install the upgrades of Microsoft service packs.

D.

Implement effective firewalls.

Buy Now
Questions 97

Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?

Options:

A.

MS-CHAP v2

B.

SSL

C.

WEP

D.

EFS

Buy Now
Questions 98

Which of the following protocols is used as a transport protocol for Internet dial-up connections?

Options:

A.

SNMP

B.

PPP

C.

DHCP

D.

SMTP

Buy Now
Questions 99

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Strong authentication method

B.

Firewall

C.

Strong data encryption during travel

D.

Anti-virus programs

Buy Now
Questions 100

A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Disable ActiveX Controls

B.

Disable Active Scripting

C.

Implement File Integrity Auditing

D.

Configure Security Logs

Buy Now
Questions 101

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company ' s network. Which of the following encryption types will Linux use?

Options:

A.

CHAP

B.

MSCHAP

C.

RC2

D.

3DES

Buy Now
Questions 102

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Session encryption

B.

Removing all stored procedures

C.

Input sanitization

D.

Applying strong firewall rules

Buy Now
Questions 103

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company ' s intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

FTP server

B.

VPN

C.

Microsoft Internet Information Server (IIS)

D.

Certificate server

Buy Now
Questions 104

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you ' ll first need to understand all of the following except for which one?

Options:

A.

Summary milestone for the likely project phases

B.

Measurable project objectives and related success criteria

C.

Summary budget

D.

Quality improvement program your company uses

Buy Now
Questions 105

Fill in the blank with the appropriate word.

________ is also used to refer to any attempt to circumvent the security of other types of cryptographic algorithms and protocols in general, and not just encryption.

Options:

Buy Now
Questions 106

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Buy Now
Questions 107

Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals:

 No external traffic should be allowed into the network.

 Administrators should be able to restrict the websites which can be accessed by the internal users.

Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Internet Connection Sharing (ICS)

B.

Network Address Translator (NAT)

C.

Firewall

D.

Proxy Server

E.

Routing and Remote Access Service (RRAS)

Buy Now
Questions 108

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They allow an attacker to conduct a buffer overflow.

B.

They allow an attacker to replace utility programs that can be used to detect the attacker ' s activity.

C.

They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

D.

They allow an attacker to run packet sniffers secretly to capture passwords.

Buy Now
Questions 109

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC

B.

MAC

C.

RBAC

D.

DAC

Buy Now
Questions 110

Which of the following applications would be considered a data warehousing application?

Options:

A.

Golf score tracking

B.

Badge reader

C.

Fraud detection

D.

eCommerce site

Buy Now
Questions 111

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Changing keys often.

B.

Using the longest key supported by hardware.

C.

Using a 16 bit SSID.

D.

Using a non-obvious key.

Buy Now
Questions 112

You and your project team are just starting the risk identification activities for a project that is scheduled to last for 18 months. Your project team has already identified a long list of risks that need to be analyzed. How often should you and the project team do risk identification?

Options:

A.

Identify risks is an iterative process.

B.

At least once per month

C.

It depends on how many risks are initially identified.

D.

Several times until the project moves into execution

Buy Now
Questions 113

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Strong data encryption during travel

B.

Firewall

C.

Anti-virus programs

D.

Strong authentication method

Buy Now
Questions 114

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Options:

A.

IDS

B.

Snort

C.

Firewall

D.

WIPS

Buy Now
Questions 115

Which of the following is a virus that can redirect the disk head to read another sector instead of the one in which it resides?

Options:

A.

Multipartite virus

B.

Macro virus

C.

Stealth virus

D.

Boot sector virus

Buy Now
Questions 116

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

Options:

A.

Implement a network based IDS.

B.

Implement a passive IDS

C.

Implement a stateful packet inspection firewall.

D.

Implement a honey pot.

Buy Now
Questions 117

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Qualitative analysis

B.

Quantitative analysis

C.

Risk identification

D.

Estimate activity duration

Buy Now
Questions 118

You are the project manager for the TTR project. You are in the process of gathering information for risk identification. You ask experts to participate in the process through their emails for maintaining anonymity. You collect the responses, summarize them, and are then re-circulated to the experts for further comment. Which of the following techniques are you using for risk identification?

Options:

A.

SWOT analysis

B.

Delphi

C.

Expert judgment

D.

Brainstorming

Buy Now
Questions 119

The Project Procurement Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Contract Administration

B.

Team Development

C.

Staff Acquisition

D.

Contract Closure

Buy Now
Questions 120

Which of the following statements are true about MS-CHAPv2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be replaced with EAP-TLS as the authentication mechanism for PPTP.

B.

It provides an authenticator-controlled password change mechanism.

C.

It is subject to offline dictionary attacks.

D.

It is a connectionless protocol.

Buy Now
Questions 121

Which of the following types of cryptography algorithms is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation?

Options:

A.

RC2

B.

Stream cipher

C.

Block cipher

D.

Triple DES

Buy Now
Questions 122

Which of the following tools can be used for stress testing of a Web server?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Internet bots

B.

Spyware

C.

Anti-virus software

D.

Scripts

Buy Now
Questions 123

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

Options:

A.

JPlag

B.

BackTrack

C.

Vedit

D.

Ettercap

Buy Now
Questions 124

Which of the following processes is described in the statement below?

" It is a process of developing an approximation of the costs of the resources needed to complete project activities. "

Options:

A.

Cost Control

B.

Cost Budgeting

C.

Activity Resource Estimating

D.

Cost Estimating

Buy Now
Questions 125

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Options:

A.

Single Sign-On

B.

Dynamic

C.

One-time password

D.

Kerberos

Buy Now
Questions 126

An intruder is trying to get user passwords by pretending to be help desk staff. Which of the following types of security attacks do you think it is?

Options:

A.

Hacking

B.

Man-in-the-middle

C.

Spoofing

D.

Social Engineering

Buy Now
Questions 127

Which of the following statements is true about the difference between worms and Trojan horses?

Options:

A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms replicate themselves while Trojan horses do not.

D.

Worms can be distributed through emails while Trojan horses cannot.

Buy Now
Questions 128

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Integrity

C.

Non-repudiation

D.

Confidentiality

Buy Now
Questions 129

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-are-secure network. Which of the following IEEE-based traffic can be sniffed with Kismet?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

802.11g

B.

802.11a

C.

802.11b

D.

802.11n

Buy Now
Questions 130

You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?

Options:

A.

A Virus

B.

A reactive IDS.

C.

A Honey Pot

D.

A Polymorphic Virus

Buy Now
Questions 131

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker ' s intentions?

Options:

A.

Land attack

B.

Internal attack

C.

DoS attack

D.

Reconnaissance attack

Buy Now
Questions 132

Which of the following is a complete indexed set of records of the procurement process incorporated into the administrative closure process?

Options:

A.

Contract file

B.

Required resources and skills

C.

Required actions to complete the project scope

D.

Description of the work packages

Buy Now
Questions 133

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Stealth

B.

Snow

C.

Blindside

D.

ImageHide

Buy Now
Questions 134

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Steg-Only Attack

B.

Stegdetect Attack

C.

Active Attacks

D.

Chosen-Stego Attack

Buy Now
Questions 135

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server. Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Policy-based detection

B.

Signature-based detection

C.

Anamoly-based detection

D.

Honey pot detection

Buy Now
Questions 136

You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?

Options:

A.

WPA 2

B.

WEP

C.

TKIP

D.

WPA

Buy Now
Questions 137

Olive is the program manager for her organization. She has created a request for proposal for a large portion of her program. In this work to be procured she has set several requirements for the vendors to participate. The chief among these requirements is a vendor must have at least four licensed electricians in his team. This requirement for four licensed electricians is an example of which one of the following terms?

Options:

A.

Vendor analysis requirements

B.

Scoring model

C.

Evaluation criteria

D.

Screening system

Buy Now
Questions 138

Which interface does an IPS sensor use to communicate with a security appliance for management purposes?

Options:

A.

Management interface

B.

User interface

C.

Command and control interface

D.

Monitoring interface

Buy Now
Questions 139

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Cookie poisoning

B.

Cross site scripting

C.

Man-in-the-middle attack

D.

Computer-based social engineering

Buy Now
Questions 140

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GSLC Question 140

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Buy Now
Questions 141

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can handle encrypted and unencrypted traffic equally.

B.

It can detect events scattered over the network.

C.

It is a technique that allows multiple computers to share one or more IP addresses.

D.

It cannot detect events scattered over the network.

Buy Now
Questions 142

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Direct

C.

Circumstantial

D.

Incontrovertible

Buy Now
Questions 143

Which of the following processes is described in the statement below?

" It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project. "

Options:

A.

Identify Risks

B.

Perform Quantitative Risk Analysis

C.

Perform Qualitative Risk Analysis

D.

Monitor and Control Risks

Buy Now
Questions 144

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer named SERVER1 with NTFS file system. SERVER1 has a 802.11 wireless LAN adapter. The Wireless LAN Service is installed on SERVER1. You want to know about the 802.11 wireless LAN interface information, network information, and wireless settings on the system on SERVER1.

Which of the following commands will you use to accomplish the task?

Options:

A.

netsh wlan show interfaces

B.

netsh wlan show all

C.

netsh wlan show settings

D.

netsh wlan show drivers

Buy Now
Questions 145

You work as a Network Administrator for Net World Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. A Public Key Infrastructure (PKI) is installed on a server in the domain. You are planning to go on vacation for two weeks. Your team has three assistant administrators. You are required to accomplish the following tasks:

• Delegate the authority to the assistant administrators to issue, approve, and revoke certificates.

• The solution must involve least administrative burden.

Which of the following steps will you take to accomplish the tasks?

Options:

A.

Assign the Certificate Managers role to the assistant administrator user accounts.

B.

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the CA Administrator role to the CertAdmins group.

C.

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the Enterprise Administrators role to the CertAdmins group.

D.

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the Certificate Managers role to the CertAdmins group.

Buy Now
Questions 146

Donna is the project manager for her organization. She is preparing a plan to manage changes to the project should changes be requested. Her change management plan defines the process for documenting, tracking, and determining if the changes should be approved or declined. What system is considered the parent of the change control system documented in Donna ' s plan?

Options:

A.

Project Management Information System

B.

Change Control System

C.

Integrated Change Control System

D.

Quality Management System

Buy Now
Questions 147

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Dumpster diving

C.

Spam

D.

Encapsulation

Buy Now
Questions 148

Which of the following are the benefits of information classification for an organization?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It helps reduce the Total Cost of Ownership (TCO).

D.

It helps identify which protections apply to which information.

Buy Now
Questions 149

You have been hired as a project manager for a project. The initial project planning predicts a benefitcost ratio ( BCR ) of the project as 3.5. What does this figure mean?

Options:

A.

A loss of 3.5 percent

B.

A profit of 3.5 percent

C.

A loss of $3.5 for each dollar expended

D.

A payback of $3.5 for each dollar expended

Buy Now
Questions 150

Which of the following statements about front door attack is true?

Options:

A.

In this type of attack, the hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses a dictionary of common words to find out the password of a user.

C.

This type of attack is used to sniff passwords or information from a legitimate transaction to be used for the hacker ' s advantage.

D.

In this type of attack, the hacker has all the correct information to get into a system and does not have to perform any additional task to get that information.

Buy Now
Questions 151

What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?

Options:

A.

BATNA

B.

Bias

C.

ZOPA

D.

PON

Buy Now
Questions 152

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Magic Lantern

B.

Obiwan

C.

IPSec VPN

D.

SARA

Buy Now
Questions 153

Which of the following types of security will be the cause of concern if the server has been stolen from the organization ' s premises?

Options:

A.

Information security

B.

Operational security

C.

Physical security

D.

User authentication

Buy Now
Questions 154

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. All client computers on the network run Windows XP Professional.

You configure a public key infrastructure ( PKI ) on the network. You configure a root CA and a subordinate CA on the network. For security reasons, you want to take the root CA offline. You are required to configure the CA servers to support for certificate revocation. Choose the steps you will require to accomplish the task.

GSLC Question 154

Options:

A.
Buy Now
Questions 155

Which of the following viruses infects multiple targets?

Options:

A.

Macro virus

B.

Multipartite virus

C.

Polymorphic virus

D.

Stealth virus

Buy Now
Questions 156

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

Options:

A.

Project Integration Management

B.

Project Time Management

C.

Project Scope Management

D.

Project Risk Management

Buy Now
Questions 157

Which of the following protocols is used for destination and error reporting functions in datagram processing?

Options:

A.

PPP

B.

SRP

C.

NTP

D.

ICMP

Buy Now
Questions 158

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WEP

B.

WPA-PSK

C.

WPA2 -EAP

D.

WPA-EAP

Buy Now
Questions 159

Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

Options:

A.

Macro

B.

Polymorphic

C.

Logic Bomb

D.

Boot sector

Buy Now
Questions 160

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted; however, you want the least difficulty in the encryption process. Which of the following should you choose?

Options:

A.

DES

B.

MD5

C.

Asymmetric Encryption

D.

Symmetric Encryption

Buy Now
Questions 161

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Options:

A.

In person attack

B.

Third-party authorization attack

C.

Important user posing attack

D.

Impersonation attack

Buy Now
Questions 162

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:

A.

Internet Authentication Server

B.

Certificate User

C.

Certification Authority

D.

Domain Controller

Buy Now
Questions 163

Which model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts?

Options:

A.

Spiral

B.

Prototyping

C.

View

D.

Waterfall

Buy Now
Questions 164

Managerial wisdom is the combination of knowledge as well as experience. It is the ability of the leaders to understand the members of the team. Which of the following are the characteristics that come under managerial wisdom?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dominating

B.

Simple

C.

Values

D.

Listener

Buy Now
Questions 165

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:

A.

Auditing

B.

Packet filtering

C.

Authentication

D.

Hacking

Buy Now
Questions 166

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company ' s headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:

A.

The recipient ' s public key

B.

Your private key

C.

The recipient ' s private key

D.

Your public key

Buy Now
Questions 167

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

Quantitative risk analysis

B.

Seven risk responses

C.

Qualitative risk analysis

D.

A risk probability-impact matrix

Buy Now
Questions 168

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You have recently added three new SCSI hard disk drives to a domain controller that already has two physical disk drives. The new SCSI disk drives are configured in a RAID-5 array. You are required to enhance the performance of the Active Directory database on the domain controller. Which of the following steps will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Move the log files to a separate physical disk other than the one used in RAID-5 or used by the operating system.

B.

Move the log files to the RAID-5 array.

C.

Move the NTDS.DIT file to the RAID-5 array.

D.

Move the NTDS.DIT file to a disk other than the one used in RAID-5 or used by the operating system.

Buy Now
Questions 169

John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?

Options:

A.

18 U.S.C. 1362

B.

18 U.S.C. 2701

C.

18 U.S.C. 1030

D.

18 U.S.C. 2510

Buy Now
Questions 170

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering

B.

Smurf DoS

C.

Brute force

D.

Ping flood attack

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Apr 30, 2026
Questions: 567

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GSLC testing engine

PDF (Q&A)

$43.57  $124.49
buy now GSLC pdf