Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 4 / 12
Total 567 questions

You work as an Administrator for Bluesky Inc. The company has 145 Windows XP Professional client computers and eighty Windows 2003 Server computers. You want to install a security layer of WAP specifically designed for a wireless environment. You also want to ensure that the security layer provides privacy, data integrity, and authentication for client-server communications over a wireless network. Moreover, you want a client and server to be authenticated so that wireless transactions remain secure and the connection is encrypted. Which of the following options will you use to accomplish the task?

A.

Wireless Transport Layer Security (WTLS)

B.

Recovery Console

C.

Wired Equivalent Privacy (WEP)

D.

Virtual Private Network (VPN)

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

FTP server

B.

VPN

C.

Microsoft Internet Information Server (IIS)

D.

Certificate server

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

A.

They allow an attacker to conduct a buffer overflow.

B.

They allow an attacker to replace utility programs that can be used to detect the attacker's activity.

C.

They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

D.

They allow an attacker to run packet sniffers secretly to capture passwords.

You are the project manager for your organization and are trying to determine which vendor your organization will use. You have determined that any vendor that would like to bid on your project work will need to have a Microsoft Certified System Engineer on staff, have eight years of Cisco experience, and have at least two references from similar projects. What have you created in this scenario?

A.

Screening system for the vendors

B.

Weighting system for the vendors

C.

Preferred vendors list

D.

Bidders conference

You work as a Network Administrator for Infosec Inc. The company has a Windows 2003-based server. You have installed McAfee antivirus as well as anti-spyware software on the server. One day, you come to know that not only have the security applications running on the server (including software firewalls, anti-virus, and anti-spyware) been disabled, but the anti-virus and anti-spyware definitions have also been deleted. You suspect that this is due to malware infection. Which of the following types of malware is the most likely cause of the issue?

A.

Whack-A-Mole

B.

FireKiller 2000

C.

Beast

D.

SubSeven

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.

Containment

B.

Eradication

C.

Identification

D.

Preparation

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is an IPSec protocol.

B.

It is a text-based communication protocol.

C.

It uses TCP port 22 as the default port and operates at the application layer.

D.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme?

Each correct answer represents a complete solution. Choose all that apply.

A.

Kerberos requires continuous availability of a central server.

B.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

C.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.

D.

Kerberos requires the clocks of the involved hosts to be synchronized.

You are the program manager for your organization. Management has asked that you determine when resources, such as leased equipment, are no longer needed so that you may release the resources to save time, money, and utilization of resources within your program. What program management process is management asking you to perform?

A.

Contract administration

B.

Resource management

C.

Procurement management

D.

Resource control

Which of the following types of cryptography algorithms is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation?

A.

RC2

B.

Stream cipher

C.

Block cipher

D.

Triple DES

Which system is designed to analyze, detect, and report on security-related events?

A.

HIPS

B.

NIPS

C.

NIDS

D.

HIDS

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

A.

Security policy

B.

Auditing

C.

Security awareness training

D.

Data Backup

You have installed Windows Vista Home Premium on your home computer. The computer is connected to the Internet through an ADSL connection. You want to protect yourself from the traps of fraudulent sites. Which of the following features of Internet Explorer 7+ will you use?

A.

Pop-up blocker

B.

Protected mode

C.

Privacy settings

D.

Phishing filter

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

A.

An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.

B.

An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.

C.

An unauthorized person modifies packet headers by using someone else's IP address to hide his identity.

D.

An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

A.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

B.

Remove the SNMP agent or disable the SNMP service.

C.

Monitor the programs running on the server to see whether any new process is running on the server or not.

D.

Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.