Exam Details

  • Exam Code
    :GSLC
  • Exam Name
    :GIAC Security Leadership Certification (GSLC)
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :701 Q&As
  • Last Updated
    :May 05, 2024

GIAC GIAC Information Security GSLC Questions & Answers

  • Question 31:

    Which of the following terms describes the statement given below?

    "It is a cryptographic protocol that provides security and data integrity for communications over networks such as the Internet."

    A. NTP

    B. SSH

    C. SNMP2/3

    D. TSL

  • Question 32:

    Which of the following tools is used to attack the Digital Watermarking?

    A. 2Mosaic

    B. Gifshuffle

    C. Active Attacks

    D. Steg-Only Attack

  • Question 33:

    You are the project manager for the GHY Organization. A stakeholder has presented a change to your project that will cause the project scope to increase considerably. You are considering the change for approval and you need to review the impact of the change on all areas of the project. What change control system component is responsible for guiding the review of the impact of all changes on the project management knowledge areas?

    A. Scope change control system

    B. Change control system

    C. Configuration management

    D. Integrated change control

  • Question 34:

    Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

    A. Password policies

    B. Data classification

    C. Vulnerability assessments

    D. Data encryption

  • Question 35:

    You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

    A. The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

    B. The laptop will be able to access the wireless network but the security will be compromised.

    C. The WAP will allow the connection with the guest account's privileges.

    D. The laptop will not be able to access the wireless network.

  • Question 36:

    You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients. The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

    A. Take the root CA offline after it issues certificates to its subordinate CAs.

    B. Take the subordinate CA offline after it gets the certificates from the root CA.

    C. Place all CA servers in a locked room.

    D. Configure a firewall on the network.

  • Question 37:

    Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

    A. IFB

    B. RFI

    C. RFP

    D. RFQ

  • Question 38:

    When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

    A. True positive

    B. True negative

    C. False negative

    D. False positive

  • Question 39:

    Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

    A. Risk register

    B. Quality management plan

    C. Project charter

    D. Risk management plan

  • Question 40:

    Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?

    A. Digital signature

    B. Hash algorithm

    C. Public-key

    D. Quantum

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSLC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.