Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 6 / 12
Total 567 questions

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

A.

Application layer

B.

Transport Layer

C.

Link layer

D.

Internet layer

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

A.

Identifying the risk

B.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

C.

Identifying the accused

D.

Assessing the impact of potential threats

Olive is the program manager for her organization. She has created a request for proposal for a large portion of her program. In this work to be procured she has set several requirements for the vendors to participate. The chief among these requirements is a vendor must have at least four licensed electricians in his team. This requirement for four licensed electricians is an example of which one of the following terms?

A.

Vendor analysis requirements

B.

Scoring model

C.

Evaluation criteria

D.

Screening system

You are the program manager for your organization. You have proposed a program that will cost $750,000 and will last for four years. Management is concerned with the cost of the program in relation to the return your program will bring. If the rate of return is six percent what is the minimum value your project should return in four years based on the investment of the program?

A.

$795,000

B.

$750,001

C.

$946,857

D.

$750,000

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 2510

B.

18 U.S.C. 1029

C.

18 U.S.C. 1028

D.

18 U.S.C. 1030

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?

A.

RSA

B.

Diffie-Hellman

C.

Twofish

D.

Blowfish

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company's network. Which of the following encryption types will Linux use?

A.

CHAP

B.

MSCHAP

C.

RC2

D.

3DES

Which of the following domains of the DNS hierarchy consists of categories found at the end of domain names, such as .com or .uk and divides the domains into organizations (.org), businesses (.com), countries (.uk), and other categories?

A.

Top-level domain

B.

Root-level domain

C.

Second level domain

D.

Name server

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open issues in the project and how the resolution of the issues may lead to additional project changes. On what document are Tomas and the stakeholders working in this scenario?

A.

Change management plan

B.

Communications management plan

C.

Issue log

D.

Risk management plan

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

A.

Stick

B.

ADMutate

C.

Absinthe

D.

Fragroute

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

A.

STP

B.

UDP

C.

TCP

D.

SNMP

Which of the following is used to indicate that the project team has decided not to change the project management plan to deal with a risk or is unable to identify any other suitable response strategy?

A.

Risk avoidance

B.

Risk transference

C.

Risk acceptance

D.

Risk mitigation

In Which of the following types of white box testing are the test cases designed based on data flow within the code?

A.

Data flow testing

B.

Control flow testing

C.

Path testing

D.

Branch testing

Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?

A.

Zero-day

B.

IP spoofing

C.

Brute force

D.

FMS