Exam Details

  • Exam Code
    :GSLC
  • Exam Name
    :GIAC Security Leadership Certification (GSLC)
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :701 Q&As
  • Last Updated
    :May 05, 2024

GIAC GIAC Information Security GSLC Questions & Answers

  • Question 21:

    You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. You install access points for enabling a wireless network. The sales team members and the managers in the company will be using laptops to connect to the LAN through wireless connections. Therefore, you install WLAN network interface adapters on their laptops. However, you want to restrict the sales team members and managers from communicating directly to each other. Instead, they should communicate through the access points on the network. Which of the following topologies will you use to accomplish the task?

    A. Infrastructure

    B. Star

    C. Ad hoc

    D. Mesh

  • Question 22:

    Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

    A. Single Loss Expectancy (SLE)

    B. Exposure Factor (EF)

    C. Annualized Rate of Occurrence (ARO)

    D. Safeguard

  • Question 23:

    A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know

    any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

    What type of attack has just occurred?

    A. Replay attack

    B. Social Engineering attack

    C. Brute Force attack

    D. War dialing attack

  • Question 24:

    Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

    A. File-based

    B. Anomaly-based

    C. Signature-based

    D. Network-based

  • Question 25:

    A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

    A. Add the identified risk to the issues log.

    B. Add the identified risk to a quality control management control chart.

    C. Add the identified risk to the low-level risk watchlist.

    D. Add the identified risk to the risk register.

  • Question 26:

    Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

    A. WPA-PSK

    B. WPA-EAP

    C. WPA2

    D. WEP

  • Question 27:

    Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is

    given below:

    This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of

    the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME. Which of the following viruses has the symptoms as the one described above?

    A. Nimda

    B. Chernobyl

    C. I Love You

    D. Melissa

  • Question 28:

    Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

    A. DES

    B. AES

    C. PGP

    D. IDEA

  • Question 29:

    Which of the following terms is synonymous with the willful destruction of another person's property?

    A. Spoofing

    B. Phishing

    C. Vandalism

    D. Hacking

  • Question 30:

    David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

    A. Striped volume

    B. Spanned volume

    C. RAID-5 volume

    D. Mirrored volume

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSLC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.