Exam Details

  • Exam Code
    :GSLC
  • Exam Name
    :GIAC Security Leadership Certification (GSLC)
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :701 Q&As
  • Last Updated
    :Oct 25, 2024

GIAC GIAC Information Security GSLC Questions & Answers

  • Question 661:

    Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals: No external traffic should be allowed into the network. Administrators should be able to restrict the websites which can be accessed by the internal users. Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.)

    A. Internet Connection Sharing (ICS)

    B. Network Address Translator (NAT)

    C. Firewall

    D. Proxy Server

    E. Routing and Remote Access Service (RRAS)

  • Question 662:

    You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy?

    A. Create a GPO. Configure Audit Object Access. Attach the GPO to the domain.

    B. Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file.

    C. Enable debug logging on the DNS server.

    D. Create a new OU. Move the DNS server account to the OU. Create a GPO. Configure Audit Logon events. Attach the GPO to the OU.

  • Question 663:

    Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.

    A. Identifying the risk

    B. Finding an economic balance between the impact of the risk and the cost of the countermeasure

    C. Identifying the accused

    D. Assessing the impact of potential threats

  • Question 664:

    The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it. Which of the following tools works by placing the host system network card into the promiscuous mode?

    A. Sniffer

    B. THC-Scan

    C. NetStumbler

    D. Snort

  • Question 665:

    Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn't specifically ask for the added features. This scenario is an example of which one of the following?

    A. Scope creep

    B. Gold plating

    C. Change management

    D. Value added change

  • Question 666:

    Which of the following is used to describe the type of FTP access in which a user does not have permissions to list the contents of directories, but can access the contents if he knows the path and file name?

    A. Secure FTP

    B. Blind FTP

    C. Passive FTP

    D. Hidden FTP

  • Question 667:

    Which system is designed to analyze, detect, and report on security-related events.?

    A. HIPS

    B. NIPS

    C. NIDS

    D. HIDS

  • Question 668:

    Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

    A. Armored virus

    B. Stealth virus

    C. Multipartite virus

    D. Polymorphic virus

  • Question 669:

    Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?

    A. WEP

    B. WAP

    C. L2TP

    D. IPSec

  • Question 670:

    Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply.

    A. Security policy

    B. Auditing

    C. Security awareness training

    D. Data Backup

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSLC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.