New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSLC - GIAC Security Leadership Certification (GSLC)

Page: 8 / 12
Total 567 questions

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

HTTP

B.

TLS

C.

SNMP

D.

SSL

Which of the following can provide security against man-in-the-middle attack?

A.

Strong authentication method

B.

Firewall

C.

Strong data encryption during travel

D.

Anti-virus programs

What is the major difference between a worm and a Trojan horse?

A.

A worm is self replicating, while a Trojan horse is not.

B.

A worm is a form of malicious program, while a Trojan horse is a utility.

C.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

D.

A worm spreads via e-mail, while a Trojan horse does not.

Which of the following is a DNS database resource record containing the host DNS name and the IPv6 address?

A.

AAAA

B.

IPv6

C.

Bzip2

D.

HOST

Which of the following is involved with the improvement of different courses of actions that include changes in schedule, resources, or contract?

A.

Planning Meeting and Analysis

B.

Risk response planning

C.

Contingency plan

D.

Acceptance response

What do spikes in a power line indicate?

A.

Interference superimposed onto the power line

B.

Momentary high voltage

C.

Prolonged loss of power

D.

Momentary low voltage

The Project Scope Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

A.

Create Work Breakdown Structure (WBS)

B.

Verify Scope

C.

Select Sellers

D.

Control Scope

In which of the following does a project manager assign certain points towards various categories to judge the vendors?

A.

Project plan

B.

Project analysis

C.

Screening system

D.

Weighting system

Which of the following is the encryption subsystem of the NTFS file system?

A.

IIS

B.

RSA

C.

ECC

D.

EFS

Which of the following RAID levels is supported by an operating system?

A.

RAID 4

B.

RAID 6

C.

RAID 0

D.

RAID 3

Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?

A.

IWA

B.

Digest authentication

C.

MPA

D.

SPAP

Which of the following programs collects email addresses of users and creates a mailing list?

A.

Worms

B.

Stealth virus

C.

Boot virus

D.

Spambot

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

A.

AES

B.

DES

C.

RSA

D.

TripleDES

A user has opened a Web site that automatically starts downloading malicious code onto his computer.

What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

A.

Disable ActiveX Controls

B.

Disable Active Scripting

C.

Implement File Integrity Auditing

D.

Configure Security Logs

Which of the following is a read-only copy of a zone and obtains its resource records from other name servers?

A.

Secondary zone

B.

Primary zone

C.

Stub zone

D.

SOA zone