Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 10 / 12
Total 567 questions

Which of the following is the method of hiding data within another media type such as graphic or document?

A.

Cryptanalysis

B.

Spoofing

C.

Packet sniffing

D.

Steganography

Nancy is the project manager for YYF project. She is receiving bids and proposals from different vendors. She will apply previously defined selection criteria to select one or more sellers who are qualified to perform the work and acceptable as a seller. She is in which of the following processes?

A.

Close Procurements

B.

Conduct Procurements

C.

Plan Procurements

D.

Administer Procurements

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

A.

Use Incident handling

B.

Use SMART model

C.

Use OODA loop

D.

Use Information assurance

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses asymmetric key pairs.

B.

It uses symmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It is a digital representation of information that identifies users.

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

A.

Application-level gateway

B.

Proxy server

C.

Firewall

D.

DMZ

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

A.

Soften

B.

Blur

C.

Sharpen

D.

Rotate

Which of the following are the algorithms contained by the digital signature policy?

Each correct answer represents a complete solution. Choose all that apply.

A.

Information validation

B.

Signing

C.

Signature verifying

D.

Key Generation

Which of the following terms describes an attempt to transfer DNS zone data?

A.

Reconnaissance

B.

Dumpster diving

C.

Spam

D.

Encapsulation

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated.

In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections.

Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

A.

The laptop users will be able to use smart cards for getting authenticated.

B.

None of the tasks will be accomplished.

C.

Both tasks will be accomplished.

D.

The wireless network communication will be secured.

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer named SERVER1 with NTFS file system. SERVER1 has a 802.11 wireless LAN adapter. The Wireless LAN Service is installed on SERVER1. You want to know about the 802.11 wireless LAN interface information, network information, and wireless settings on the system on SERVER1.

Which of the following commands will you use to accomplish the task?

A.

netsh wlan show interfaces

B.

netsh wlan show all

C.

netsh wlan show settings

D.

netsh wlan show drivers

Which type of attack is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs?

A.

Bluesnarfing

B.

Bluebugging

C.

Blue Jacking

D.

Bluecast

Which of the following is the best way of protecting important data against virus attack?

A.

Using strong passwords to log on to the network.

B.

Taking daily backup of data.

C.

Updating the anti-virus software regularly.

D.

Implementing a firewall

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

A.

Network anti-spyware software

B.

Protocol analyzers

C.

Network anti-virus software

D.

Site surveys

You are a project manager for a recycling company. You are in the process of reviewing proposals from sellers for recycling equipment. You notice the scope statement states the company required to abide by the environmental agencies regulations regarding waste. As a result, you select proposals that automatically include features such as scrubbers and baghouses to reduce hazardous waste. Which of the following is true regarding the scope statement?

A.

It includes an introductory schedule management plan.

B.

Knowing the limits and the projects required helps determine the resources to purchase.

C.

It is a deliverable-oriented collection of project components.

D.

It is the methods and procedures an organization must follow to create the activity list.

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

A.

WEP

B.

WPA-PSK

C.

WPA2 -EAP

D.

WPA-EAP