Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 2 / 12
Total 567 questions

You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

A.

Covering tracks

B.

Scanning

C.

Gaining access

D.

Reconnaissance

Which of the following tools can be used to read NetStumbler's collected data files and present street maps showing the logged WAPs as icons, whose color and shape indicates WEP mode and signal strength?

A.

NetStumbler

B.

WEPcrack

C.

StumbVerter

D.

Kismet

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

A.

WPA-PSK

B.

WPA-EAP

C.

WPA2

D.

WEP

Which of the following applications work as mass-emailing worms?

Each correct answer represents a complete solution. Choose two.

A.

Nimda virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Chernobyl virus

Which method is used to configure several disk drives into a logical disk drive and provides faulttolerance, redundancy, lower latency, and higher bandwidth for read/write operations?

A.

DRM

B.

DAC

C.

RAID

D.

MAC

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites.

Which of the following would protect against this?

A.

Three factor authentication

B.

Two factor authentication

C.

Mutual authentication

D.

MAC

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option.

What will you do to enable Shared Key authentication?

A.

Install EAP-TLS

B.

Install PEAP-MS-CHAP v2

C.

Install Service Pack 1

D.

Enable WEP

PsPasswd is a tool used by network administrators to change an account password on the local or remote system. Which of the following are the command syntaxes used by the PsPasswd tool?

Each correct answer represents a complete solution. Choose all that apply.

A.

-t

B.

-u

C.

username

D.

NewPassword

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Single Loss Expectancy (SLE)

B.

Exposure Factor (EF)

C.

Annualized Rate of Occurrence (ARO)

D.

Safeguard

You work as a Network Administrator for NetPerfect Inc. You have implemented a firewall on the company's network. You want to ensure that outside users cannot access the internal FTP servers on the network. What will you do to accomplish the task?

A.

Block the TCP port 443 on the firewall.

B.

Block the UDP port 1701 and TCP port 1723 on the firewall.

C.

Block the TCP port 80 on the firewall.

D.

Block the TCP ports 20 and 21 on the firewall.

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

A.

Fixed Price with Economic Price Adjustment

B.

Fixed Price Incentive Fee

C.

Cost Plus Fixed Fee Contract

D.

Firm Fixed Price

Which of the following terms describes the statement given below?

"It provides the testers with complete knowledge of the infrastructure to be tested, often including network diagrams, source code, and IP addressing information."

A.

BackTrack

B.

GFI LANguard

C.

White box penetration testing

D.

Black box penetration testing

In what type of attack does an attacker capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network?

A.

Dictionary attack

B.

Ping flood attack

C.

DoS attack

D.

Replay attack

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. You install access points for enabling a wireless network. The sales team members and the managers in the company will be using laptops to connect to the LAN through wireless connections. Therefore, you install WLAN network interface adapters on their laptops. However, you want to restrict the sales team members and managers from communicating directly to each other. Instead, they should communicate through the access points on the network. Which of the following topologies will you use to accomplish the task?

A.

Infrastructure

B.

Star

C.

Ad hoc

D.

Mesh

Holly is the project manager of the GHQ Project for her organization. The project is using the AAA IT Integrators Corporation as a vendor to do a portion of the project work. Mitch Smith, the IT Directors for the AAA IT Integrators Corporation, reports that his team has completed the project work. Holly and her team review the deliverables and she confirms that Mitch's team has indeed completed the work according to the statement of work. What document should Holly refer to now to determine the next course of action with the AAA IT Integrators Corporation?

A.

Procurement management plan

B.

Statement of Work

C.

Contract

D.

Project management plan