Exam Details

  • Exam Code
    :GSLC
  • Exam Name
    :GIAC Security Leadership Certification (GSLC)
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :701 Q&As
  • Last Updated
    :May 13, 2024

GIAC GIAC Information Security GSLC Questions & Answers

  • Question 691:

    You work as a Network Administrator for Net World International. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. All client computers on the network run Windows Vista Ultimate. You configure a public key infrastructure (PKI) on the network. You configure a root CA and a subordinate CA on the network. For security reasons, you want to take the root CA offline. You are required to configure the CA servers to support for certificate revocation.

    Choose the steps you will take to accomplish the task.

    Select and Place:

  • Question 692:

    You work as a Network Administrator for Net World International. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. All client computers on the network run Windows Vista Ultimate. You are configuring a public key interface (PKI) to support domain users and computers. All users will use smart cards for logon. You have configured a global group named SCIssuer that will issue smart cards for all domain users. A file server named SecServer is configured on the network. The certificate-based IPSec encryption is required for all communications to and from the SecServer server. A VPN server is configured on the network to enable sales managers to connect to the network remotely using their laptops which run Windows Vista Ultimate. The L2TP connection is required for the VPN server. Place the users, computers, and groups to the certificate templates that are required for implementing the PKI infrastructure

    Select and Place:

  • Question 693:

    Drop the appropriate value to complete the formula.

    Select and Place:

  • Question 694:

    You work as a Network Administrator for Perfect Solutions Inc. The company has a Windows Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2003. You are designing a public key infrastructure (PKI) for the network. The security policy of

    the company states that all users should use smart cards for authentication. Select and place the type of certificate authority (CA) that is required to be configured on the network to implement the security policy of the company.

    Select and Place:

  • Question 695:

    A wireless network uses multiple modulation schemes to make the signal strong so that it can travel far.

    These modulation schemes work with a certain IEEE standard. Choose and drop the correct standards in the right pane according to the modulation scheme.

    Select and Place:

  • Question 696:

    You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The Sales Managers in the company use laptops for connecting to the network. You are required to provide wireless connectivity on the network to all the Sales Managers. The security policy of the company dictates that the laptops should connect only to the access points on the network. The laptops should not be able to directly communicate with each other. You are required to implement the security policy of the company.

    Choose the steps that you will take to accomplish the task.

    Select and Place:

  • Question 697:

    Fill in the blank with the appropriate word.

    A_______ is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems.

  • Question 698:

    Fill in the blank with the appropriate type of router.

    A ______ router performs packet-filtering and is used as a firewall.

  • Question 699:

    Fill in the blank with the appropriate word.

    ________ is also used to refer to any attempt to circumvent the security of other types of cryptographic algorithms and protocols in general, and not just encryption.

  • Question 700:

    Fill in the blank with the appropriate term.

    NOTE. Do not use abbreviation.

    ________ is a configurable client identification that allows a client to communicate with a particular base station.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSLC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.