Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the GIAC Management GSLC Questions and answers with ValidTests

Exam GSLC All Questions
Exam GSLC Premium Access

View all detail and faqs for the GSLC exam

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Mark works as a Network Administrator for BlueWell Inc. While surfing the Internet, he enters a URL http://www.ciw.com/web/learning in the Web browser. A Web page appears after entering the URL. Which of the following protocols can be used to resolve www.ciw.com into the correct IP address?

Options:

A.

DNS

B.

SMTP

C.

DHCP

D.

ARP

Expert Solution
Questions # 2:

Fill in the blank with the appropriate term.

____________is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Options:

Expert Solution
Questions # 3:

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Expert Solution
Questions # 4:

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

Expert Solution
Questions # 5:

John works as a Security Administrator for Enet Inc. He uses a 4 digits personal identification number (PIN) to access the computer and a token is used to perform offline checking whether John has entered the correct PIN or not. Which of the following attacks is possible on John's computer?

Options:

A.

Replay

B.

Smurf

C.

Man-In-The-Middle

D.

Brute force

Expert Solution
Questions # 6:

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Building up an incident response kit

B.

Setting up the initial position after an incident

C.

Working with QA to validate security of the enterprise

D.

Organizing a solution to remove an incident

Expert Solution
Questions # 7:

Which of the following is a fake target that deters hackers from locating your real network?

Options:

A.

Malware

B.

Honeypot

C.

KFSensor

D.

Spyware

Expert Solution
Questions # 8:

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Identification

B.

Configuration Item Costing

C.

Configuration Status Accounting

D.

Configuration Verification and Auditing

Expert Solution
Questions # 9:

You work as a Network Administrator for PassGuide Inc. You have been assigned a task to provide the right authentications to users. Which method that uses a KDC will you use to accomplish the task?

Options:

A.

Biometrics

B.

Basic authentication

C.

Digest authentication

D.

Kerberos

Expert Solution
Questions # 10:

Brutus is a password cracking tool that can be used to crack the following authentications:

• HTTP (Basic Authentication)

• HTTP (HTML Form/CGI)

• POP3 (Post Office Protocol v3)

• FTP (File Transfer Protocol)

• SMB (Server Message Block)

• Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Hybrid attack

C.

Man-in-the-middle attack

D.

Brute force attack

E.

Replay attack

Expert Solution
Questions # 11:

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

Quantitative risk analysis

B.

Seven risk responses

C.

Qualitative risk analysis

D.

A risk probability-impact matrix

Expert Solution
Questions # 12:

Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?

Options:

A.

A risk audit is a review of all the risks that have yet to occur and what their probability of happening are

B.

A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.

C.

A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.

D.

A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.

Expert Solution
Questions # 13:

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

Options:

A.

Dsniff

B.

ethereal

C.

Despoof

D.

Neotrace

Expert Solution
Questions # 14:

Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?

Options:

A.

Project Cost Management

B.

Project Integration Management

C.

Project Time Management

D.

Project Scope Management

E.

Project Quality Management

Expert Solution
Questions # 15:

You work as a Network Administrator for Perfect Labs Inc. The company has a TCP/IP-based network, which is connected to the Internet. You want to provide Internet access to users. You are concerned about virus threats and want to protect the network against potential virus attacks from the Internet.

Which of the following steps will you take to minimize potential virus attacks?

Options:

A.

Install a virus protection program on each workstation.

B.

Run SCANDISK on each workstation.

C.

Configure a firewall in the network.

D.

Install a proxy server in the network.

Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions