Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 5 / 12
Total 567 questions

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A.

Warm site

B.

Hot site

C.

Off site

D.

Cold site

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy?

A.

Create a GPO.

Configure Audit Object Access.

Attach the GPO to the domain.

B.

Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file.

C.

Enable debug logging on the DNS server.

D.

Create a new OU.

Move the DNS server account to the OU.

Create a GPO.

Configure Audit Logon events.

Attach the GPO to the OU.

Which of the following is a complete indexed set of records of the procurement process incorporated into the administrative closure process?

A.

Contract file

B.

Required resources and skills

C.

Required actions to complete the project scope

D.

Description of the work packages

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domainbased network. The network contains five Windows 2003 member servers and 300 Windows XP Professional client computers. Mark is setting up a wireless network for the company. He is planning to implement 802.1x authentication for this new wireless network. Mark is not planning to use a public key infrastructure (PKI) and certificates for authentication. Mark also wants an encrypted authentication channel and a fast reconnect using cached session keys. Which of the following authentication methods will he use to accomplish the task?

A.

Protected EAP (PEAP)

B.

EAP-Transport Layer Security (EAP-TLS)

C.

Shared Key authentication

D.

Digest authentication

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.

Which of the following actions will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Implement the IEEE 802.1X authentication for the wireless network.

B.

Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

C.

Implement the open system authentication for the wireless network.

D.

Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

E.

Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

A.

Internet Key Exchange

B.

Encapsulating Security Payload

C.

Authentication Header

D.

Skinny Client Control Protocol

Which of the following protocols is used as a transport protocol for Internet dial-up connections?

A.

SMTP

B.

SNMP

C.

DHCP

D.

PPP

Which of the following processes is NOT a part of the Project Procurement Management Knowledge Area?

A.

Develop Project Management Plan

B.

Request Seller Responses

C.

Contract Administration

D.

Plan Purchases and Acquisitions

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

A.

IDS

B.

Snort

C.

Firewall

D.

WIPS

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

A.

Armored virus

B.

Stealth virus

C.

Multipartite virus

D.

Polymorphic virus

What is the term used to describe the cost of the solution after the solution has been implemented in production by a vendor?

A.

Total cost of ownership

B.

Total ownership costing

C.

Sustainability fees

D.

Lifecycle maintenance fees

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

A.

Implement WEP

B.

Don't broadcast SSID

C.

Implement MAC filtering

D.

Implement WPA

What are the steps related to the vulnerability management program?

Each correct answer represents a complete solution. Choose all that apply.

A.

Baseline the Environment

B.

Maintain and Monitor

C.

Organization Vulnerability

D.

Define Policy

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

A.

The distortion technique

B.

The substitution technique

C.

The cover generation technique

D.

The spread spectrum technique

Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code?

A.

Worm

B.

Logic Bomb

C.

Polymorphic Virus

D.

Virus