GIAC GSLC - GIAC Security Leadership Certification (GSLC)
Which of the following uses a variable-length Initialization Vector (IV), where the encrypted data begins?
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
Which type of DNS zone is a read-only copy of the primary DNS zone?
Which of the following viruses replaces the boot sector data with its own malicious code?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.
Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.
You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.
What is the most likely cause?
Which of the following encrypts its code differently with each infection or generation of infections?
Which of the following terms refers to a prolonged loss of power?
You are the Network Administrator for a company that does a large amount of defense contract business.
A high level of security, particularly regarding sensitive documents, is required. Which of the following steps will you take to secure network printers?
Each correct answer represents a complete solution. Choose two.
What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?
Which of the following processes is described in the statement below?
"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."
Which of the following tools can be used to automate the MITM attack?
