GIAC GSLC - GIAC Security Leadership Certification (GSLC)
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following can provide security against man-in-the-middle attack?
What is the major difference between a worm and a Trojan horse?
Which of the following is a DNS database resource record containing the host DNS name and the IPv6 address?
Which of the following is involved with the improvement of different courses of actions that include changes in schedule, resources, or contract?
What do spikes in a power line indicate?
The Project Scope Management knowledge area focuses on which of the following processes?
Each correct answer represents a complete solution. Choose all that apply.
In which of the following does a project manager assign certain points towards various categories to judge the vendors?
Which of the following is the encryption subsystem of the NTFS file system?
Which of the following RAID levels is supported by an operating system?
Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?
Which of the following programs collects email addresses of users and creates a mailing list?
Which of the following is the best encryption algorithm to encrypt and decrypt messages?
A user has opened a Web site that automatically starts downloading malicious code onto his computer.
What should he do to prevent this?
Each correct answer represents a complete solution. Choose two.
Which of the following is a read-only copy of a zone and obtains its resource records from other name servers?
