Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 12 / 12
Total 567 questions

Which of the following types of security will be the cause of concern if the server has been stolen from the organization's premises?

A.

Information security

B.

Operational security

C.

Physical security

D.

User authentication

Which of the following protocols is used for destination and error reporting functions in datagram processing?

A.

PPP

B.

SRP

C.

NTP

D.

ICMP

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

A.

Using personal firewall software on your Laptop.

B.

Using an IPSec enabled VPN for remote connectivity.

C.

Using portscanner like nmap in your network.

D.

Using a protocol analyzer on your Laptop to monitor for risks.

Which of the following types of attacks cannot be prevented by technical measures only?

A.

Social engineering

B.

Smurf DoS

C.

Brute force

D.

Ping flood attack

You are the project manager of the GYG Project. A new scope change is being considered for your project. You are concerned, however, that the scope change may add costs, risks, and adversely affect the project schedule. What project management process is responsible for evaluating the full effect of a proposed scope change on your project?

A.

Schedule change control

B.

Scope change control

C.

Integrated change control

D.

Change Control Board approval process