[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 11-20

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 11 – (Topic 1)

You are the program manager for your organization. You have proposed a program that will cost $750,000 and will last for four years. Management is concerned with the cost of the program in relation to the return your program will bring. If the rate of return is six percent what is the minimum value your project should return in four years based on the investment of the program?

A. $795,000 B. $750,001 C. $946,857 D. $750,000

Answer: C

Question No: 12 – (Topic 1)

Which of the following activities result in change requests?

Each correct answer represents a complete solution. Choose all that apply.

  1. Preventive actions

  2. Inspection

  3. Defect repair

  4. Corrective actions

Answer: A,C,D

Question No: 13 – (Topic 1)

Which of the following is used to describe the type of FTP access in which a user does not have permissions to list the contents of directories, but can access the contents if he knows the path and file name?

  1. Secure FTP

  2. Blind FTP

  3. Passive FTP

  4. Hidden FTP

Answer: B

Question No: 14 – (Topic 1)

You work as Network and Security Manager for PassGuide Inc. The management of the company is quite concerned about the security of the network. The management has assigned this task to you to improve the security. Which of the following access methods will you use if the method is to be primarily based on pre-established access, and users cannot change it?

  1. PAC

  2. OrBAC

  3. MAC

  4. RBAC

    Answer: C

    Question No: 15 – (Topic 1)

    Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography.

    Victor performs the following techniques to accomplish the task:

    1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

    2. Reducing noise by adjusting color and averaging pixel value.

    3. Sharpening, Rotating, Resampling, and Softening the image. Which of the following Steganography attacks is Victor using?

      1. Steg-Only Attack

      2. Stegdetect Attack

      3. Active Attacks

      4. Chosen-Stego Attack

Answer: C

Question No: 16 – (Topic 1)

Which of the following types of cryptography algorithms is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation?

  1. RC2

  2. Stream cipher

  3. Block cipher

  4. Triple DES

Answer: C

Question No: 17 – (Topic 1)

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

  1. Use commercially available anti-keyloggers such as PrivacyKeyboard.

  2. Remove the SNMP agent or disable the SNMP service.

  3. Monitor the programs running on the server to see whether any new process is running on the server or not.

  4. Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Answer: A,C,D

Question No: 18 – (Topic 1)

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company#39;s network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. You are

designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and two subordinate CAs. The root CA will be used to issue certificates to the subordinate CAs, and the subordinate CAs will be used to issue certificates to the clients. The security policy of the company dictates that the security of high-level CAs should not be compromised. Which of the following steps will you take to implement the security policy of the company?

  1. Take the root enterprise CA offline after it issues certificates to its subordinate CAs.

  2. Place all CA servers in a locked room.

  3. Take subordinate CAs offline after they get their certificates from the root CA.

  4. Configure a firewall on the network.

Answer: A

Question No: 19 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate word.

is also used to refer to any attempt to circumvent the security of other types of cryptographic algorithms and protocols in general, and not just encryption.

Answer: Cryptanalysis

Question No: 20 – (Topic 1)

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

  1. Baseline the Environment

  2. Maintain and Monitor

  3. Organization Vulnerability

  4. Define Policy

Answer: A,B,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE