New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GSLC GIAC Security Leadership Certification (GSLC) Questions and Answers

Questions 4

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites.

Which of the following would protect against this?

Options:

A.

Three factor authentication

B.

Two factor authentication

C.

Mutual authentication

D.

MAC

Buy Now
Questions 5

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Broadcast storm

B.

DoS attack

C.

Password sniffing

D.

IP spoofing

Buy Now
Questions 6

Maria works as a Risk Analysis Manager for Gentech Inc. She starts a new IT project. Which of the following phases of her project development process is most suitable for including risk analysis?

Options:

A.

Implementation planning

B.

Project initiation

C.

System construction

D.

Requirements definition

Buy Now
Questions 7

You are configuring IPS (Intrusion Prevention System) on a Cisco IOS router. The IPS Policy Wizard window opens when you confirm the SDEE messages. Which of the following tasks can you perform using the IPS Policy Wizard window?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Select the direction of traffic for inspecting the events.

B.

Select an encryption method to improve security.

C.

Select the interface for applying the IPS rule.

D.

Select the SDF file which a user can use.

Buy Now
Questions 8

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Wingate

B.

ToneLoc

C.

THC-Scan

D.

NetStumbler

Buy Now
Questions 9

You are responsible for network security at a defense contractor. You are very concerned about sensitive data not getting out of your network. You have specific concerns about employees or contractors sending out files via FTP, or even spyware sending out data. You have blocked and monitored ports (as many as you can) on your firewall, and of course, run an anti spyware package.

Which of the following is another step you should take in preventing sensitive data from being sent out of your network without authorization?

Options:

A.

Implement an IDS.

B.

Utilize a DMZ firewall.

C.

Block all employees from emailing outside your network.

D.

Employ network wide anti virus.

Buy Now
Questions 10

A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

Options:

A.

Add the identified risk to the issues log.

B.

Add the identified risk to a quality control management control chart.

C.

Add the identified risk to the low-level risk watchlist.

D.

Add the identified risk to the risk register.

Buy Now
Questions 11

You work as a technician for Tech Perfect Inc. A user named Rick calls you. He wants to configure a wireless network for his small office. He wants to adopt a wireless technology that supports high data transfer speed. Which of the following technologies will you suggest?

Options:

A.

802.11b

B.

Infrared

C.

Bluetooth

D.

802.11

Buy Now
Questions 12

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Impersonation attack

B.

In person attack

C.

Important user posing attack

D.

Reverse social engineering attack

Buy Now
Questions 13

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

Options:

A.

Fixed Price with Economic Price Adjustment

B.

Fixed Price Incentive Fee

C.

Cost Plus Fixed Fee Contract

D.

Firm Fixed Price

Buy Now
Questions 14

Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?

Options:

A.

Digital signature

B.

Hash algorithm

C.

Public-key

D.

Quantum

Buy Now
Questions 15

Which of the following RAID standards distributes data across multiple disks in a way that gives improved speed at any given instant?

Options:

A.

RAID 01

B.

RAID 3/4

C.

RAID 1

D.

RAID 0

Buy Now
Questions 16

You are the project manager of a large project that will span several time zones. You'll be utilizing project team members from across several departments. Project team members won't be working on the project full-time and will join and leave the project based on assignments in the project schedule.

What project management plan can you create to help you manage when project times will be brought onto and released from the project team?

Options:

A.

Staffing management plan

B.

Team management plan

C.

Project management plan

D.

Human resources management plan

Buy Now
Questions 17

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:

A.

Stealth virus

B.

Multipartite virus

C.

File virus

D.

Polymorphic virus

E.

Boot sector virus

Buy Now
Questions 18

Which of the following terms describes the statement given below?

"It is a cryptographic protocol that provides security and data integrity for communications over networks such as the Internet."

Options:

A.

NTP

B.

SSH

C.

SNMP2/3

D.

TSL

Buy Now
Questions 19

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Code red

B.

Beast

C.

SQL Slammer

D.

Klez

Buy Now
Questions 20

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

B.

Remove the SNMP agent or disable the SNMP service.

C.

Monitor the programs running on the server to see whether any new process is running on the server or not.

D.

Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Buy Now
Questions 21

Which of the following terms describes the statement given below?

"It refers to a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects, and goals. This set encompasses a wide scope of activities, and these include planning, allocating, setting goals, delegation, analysis of time spent, monitoring, organizing, scheduling, and prioritizing."

Options:

A.

Time Management

B.

Digital Rights Management

C.

Perception Management

D.

Change Management

Buy Now
Questions 22

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Steganography

B.

Email spoofing

C.

Social engineering

D.

Web ripping

Buy Now
Questions 23

Which of the following is used to communicate with an authentication server commonly used in UNIX networks?

Options:

A.

MS-CHAP

B.

IPX/SPX

C.

SMTP

D.

TACACS

Buy Now
Questions 24

Nancy is the project manager for a new construction project. There are several occupational safety codes, which must be included in the project requirements. These requirements are nonnegotiable and the customer must pay for the safety measures, inspections, and training for the project team. What term best describes the cost associated with these safety requirements?

Options:

A.

Cost of quality

B.

Cost of doing business

C.

Cost of risk avoidance

D.

Cost of risk mitigation

Buy Now
Questions 25

Which of the following records is the first entry in a DNS database file?

Options:

A.

MX

B.

SOA

C.

CNAME

D.

SRV

Buy Now
Questions 26

Which type of DNS zone is a read-only copy of the primary DNS zone?

Options:

A.

Secondary DNS zone

B.

Primary DNS zone

C.

Stub DNS zone

D.

SOA DNS zone

Buy Now
Questions 27

A honey pot is a computer trap that is used to attract potential intruders or attackers. Which of the following are some advantages of honey pots?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk of takeover

B.

Limited view

C.

Reduced false positives

D.

Small set of data

Buy Now
Questions 28

Which of the following is the encryption subsystem of the NTFS file system?

Options:

A.

IIS

B.

RSA

C.

ECC

D.

EFS

Buy Now
Questions 29

Which of the following is NOT a principle and practice of the 'Minimize the number of highconsequence targets' principle?

Options:

A.

Principle of least privilege

B.

Principle of separation of privileges, duties, and roles

C.

Principle of separation of domains

D.

Principle of trusted entities from untrusted entities

Buy Now
Questions 30

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

I LOVE YOU virus

B.

Nimda virus

C.

Chernobyl virus

D.

Melissa virus

Buy Now
Questions 31

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The site should restrict the number of login attempts to only three times.

B.

The site should increase the encryption key length of the password.

C.

The site should use CAPTCHA after a specific number of failed login attempts.

D.

The site should force its users to change their passwords from time to time.

Buy Now
Questions 32

Which of the following contains information that is read by a Web application whenever a user visits a site?

Options:

A.

PII

B.

Cookie

C.

Rootkit

D.

DiD

Buy Now
Questions 33

Which of the following uses a variable-length Initialization Vector (IV), where the encrypted data begins?

Options:

A.

DES-OFB

B.

DES-ECB

C.

DES-CBC

D.

DES-CFB

Buy Now
Questions 34

Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?

Options:

A.

IWA

B.

Digest authentication

C.

MPA

D.

SPAP

Buy Now
Questions 35

Which of the following are used as a cost estimating technique during the project planning stage?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Expert judgment

B.

Function point analysis

C.

Program Evaluation Review Technique (PERT)

D.

Delphi technique

Buy Now
Questions 36

Which of the following is an input of the close procurements process?

Options:

A.

Organizational process asset updates

B.

Procurement credentials

C.

Project management plan

D.

Closed procurements

Buy Now
Questions 37

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

Options:

A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

Buy Now
Questions 38

Which of the following terms refers to a prolonged loss of power?

Options:

A.

Spike

B.

Brownout

C.

Surge

D.

Blackout

Buy Now
Questions 39

Fill in the blank with the appropriate type of router.

A _________ router performs packet-filtering and is used as a firewall.

Options:

Buy Now
Questions 40

Which of the following is a computer file used in an operating system to map hostnames to IP addresses?

Options:

A.

LMHOSTS file

B.

NSCD.CONF file

C.

TMPFS file

D.

HOSTS file

Buy Now
Questions 41

In which of the following does a project manager assign certain points towards various categories to judge the vendors?

Options:

A.

Project plan

B.

Project analysis

C.

Screening system

D.

Weighting system

Buy Now
Questions 42

Which type of repudiation states that the creator of the message denies ever creating the message even after creating it?

Options:

A.

Repudiation of submission

B.

Repudiation of creation

C.

Repudiation of receipt

D.

Repudiation of origin

Buy Now
Questions 43

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:

A.

RSA

B.

TripleDES

C.

DES

D.

AES

Buy Now
Questions 44

Which of the following RAID levels is supported by an operating system?

Options:

A.

RAID 4

B.

RAID 6

C.

RAID 0

D.

RAID 3

Buy Now
Questions 45

Which of the following malware spread through the Internet and caused a large DoS attack in

1988?

Options:

A.

Morris worm

B.

LoveLetter worm

C.

SQL slammer worm

D.

Klez worm

Buy Now
Questions 46

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

Options:

A.

Macro virus

B.

Stealth virus

C.

E-mail virus

D.

Polymorphic virus

Buy Now
Questions 47

You have been hired as a project manager for a project. The initial project planning predicts a benefitcost ratio (BCR) of the project as 3.5. What does this figure mean?

Options:

A.

A loss of 3.5 percent

B.

A profit of 3.5 percent

C.

A loss of $3.5 for each dollar expended

D.

A payback of $3.5 for each dollar expended

Buy Now
Questions 48

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

Options:

A.

Malware protection

B.

Firewall

C.

Automatic updating

D.

Other security settings

Buy Now
Questions 49

Complete the following sentence: Quality control is a(n)_______________ process while quality assurance is a(n)________________ process.

Options:

A.

Inspection, costly

B.

Management, inspection

C.

Inspection, prevention

D.

Prevention, inspection.

Buy Now
Questions 50

Roberta is the project manager of the KJL Project for her company. She is creating a chart that will help categorize the problems discovered during the quality control inspection process. She wants to create a chart where she can categorize the number of instances of problems and rank the problems based on frequency. Which chart should Roberta create?

Options:

A.

Pareto Chart

B.

Scatter diagram

C.

Fishbone diagram

D.

Control chart

Buy Now
Questions 51

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Options:

A.

Network anti-spyware software

B.

Protocol analyzers

C.

Network anti-virus software

D.

Site surveys

Buy Now
Questions 52

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Off-channel verification.

B.

Using Secret keys for authentication.

C.

Using basic authentication.

D.

Using public key infrastructure authentication.

Buy Now
Questions 53

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSHGuard

B.

nmap

C.

Fail2Ban

D.

portsentry

E.

OpenSSL

Buy Now
Questions 54

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use SMART model

C.

Use OODA loop

D.

Use Information assurance

Buy Now
Questions 55

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WEP key

B.

IP address of the router

C.

MAC address of the router

D.

SSID of the WLAN

Buy Now
Questions 56

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Spoofing

B.

Packet manipulation

C.

Denial-of-Service

D.

Eavesdropping

Buy Now
Questions 57

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Using WPA encryption

B.

MAC filtering the router

C.

Using WEP encryption

D.

Not broadcasting SSID

Buy Now
Questions 58

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Using personal firewall software on your Laptop.

B.

Using an IPSec enabled VPN for remote connectivity.

C.

Using portscanner like nmap in your network.

D.

Using a protocol analyzer on your Laptop to monitor for risks.

Buy Now
Questions 59

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Stealth

B.

Multipartite

C.

Boot sector

D.

File

Buy Now
Questions 60

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Dumpster diving

C.

Spam

D.

Encapsulation

Buy Now
Questions 61

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

Quantitative risk analysis

B.

Seven risk responses

C.

Qualitative risk analysis

D.

A risk probability-impact matrix

Buy Now
Questions 62

Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

Options:

A.

Macro

B.

Polymorphic

C.

Logic Bomb

D.

Boot sector

Buy Now
Questions 63

Which of the following are the benefits of information classification for an organization?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It helps reduce the Total Cost of Ownership (TCO).

D.

It helps identify which protections apply to which information.

Buy Now
Questions 64

Which of the following types of security will be the cause of concern if the server has been stolen from the organization's premises?

Options:

A.

Information security

B.

Operational security

C.

Physical security

D.

User authentication

Buy Now
Questions 65

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is consists of various protocols present in each layer.

B.

It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

C.

It is generally described as having five abstraction layers.

D.

It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

Buy Now
Questions 66

You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.

The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.

Which of the following types of security attacks do you think it is?

Options:

A.

Social engineering

B.

Man-in-the-middle

C.

Hacking

D.

Spoofing

Buy Now
Questions 67

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Buy Now
Questions 68

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.

Acceptance

B.

Transference

C.

Mitigation

D.

Avoidance

Buy Now
Questions 69

You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?

Options:

A.

Implement a strong password policy.

B.

Implement a honey pot.

C.

Implement a strong firewall.

D.

Implement network based anti virus.

Buy Now
Questions 70

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Configure the authentication type for the wireless LAN to Open system.

B.

Install a firewall software on each wireless access point.

C.

Configure the authentication type for the wireless LAN to Shared Key.

D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

E.

Broadcast SSID to connect to the access point (AP).

F.

On each client computer, add the SSID for the wireless LAN as the preferred network.

Buy Now
Questions 71

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Eavesdropping

B.

Fingerprinting

C.

Web ripping

D.

TCP FTP proxy scanning

Buy Now
Questions 72

Which interface does an IPS sensor use to communicate with a security appliance for management purposes?

Options:

A.

Management interface

B.

User interface

C.

Command and control interface

D.

Monitoring interface

Buy Now
Questions 73

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company's network. Which of the following encryption types will Linux use?

Options:

A.

CHAP

B.

MSCHAP

C.

RC2

D.

3DES

Buy Now
Questions 74

Which of the following processes is described in the statement below?

"It is a process of developing an approximation of the costs of the resources needed to complete project activities."

Options:

A.

Cost Control

B.

Cost Budgeting

C.

Activity Resource Estimating

D.

Cost Estimating

Buy Now
Questions 75

Which of the following backup sites takes the longest recovery time?

Options:

A.

Cold site

B.

Hot site

C.

Warm site

D.

Mobile backup site

Buy Now
Questions 76

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Integrity

C.

Non-repudiation

D.

Confidentiality

Buy Now
Questions 77

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of www.gentech.com. She is using dumpster diving to gather information about Gentech Inc. In which of the following steps of malicious hacking does dumpster diving come under?

Options:

A.

Multi-factor authentication

B.

Role-based access control

C.

Mutual authentication

D.

Reconnaissance

Buy Now
Questions 78

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Options:

A.

An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.

B.

An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.

C.

An unauthorized person modifies packet headers by using someone else's IP address to hide his identity.

D.

An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.

Buy Now
Questions 79

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

Options:

A.

JPlag

B.

BackTrack

C.

Vedit

D.

Ettercap

Buy Now
Questions 80

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

Options:

A.

Application layer

B.

Transport Layer

C.

Link layer

D.

Internet layer

Buy Now
Questions 81

Which of the following encryption algorithms is applied in the PGP encryption system?

Options:

A.

TDE

B.

Triple DES

C.

Blowfish

D.

IDEA

Buy Now
Questions 82

The Project Procurement Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Contract Administration

B.

Team Development

C.

Staff Acquisition

D.

Contract Closure

Buy Now
Questions 83

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The virus, used by John, is not in the database of the antivirus program installed on the server.

B.

John has created a new virus.

C.

The mutation engine of the virus is generating a new encrypted code.

D.

John has changed the signature of the virus.

Buy Now
Questions 84

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Identifying the risk

B.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

C.

Identifying the accused

D.

Assessing the impact of potential threats

Buy Now
Questions 85

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cell Phones

B.

Individual scanners

C.

USB Drives

D.

Individual printers

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Dec 22, 2024
Questions: 567

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99