[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 131-140

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 131 – (Topic 1)

Which of the following PPP configuration options is used to increase the effective throughput on PPP connections by reducing the amount of data in the frame that must travel across the link?

  1. Authentication

  2. Error detection

  3. Compression

  4. Multilink

Answer: C

Question No: 132 – (Topic 1)

You work as a Network Administrator for Infosec Inc. The company has a Windows 2003- based server. You have installed McAfee antivirus as well as anti-spyware software on the server. One day, you come to know that not only have the security applications running on the server (including software firewalls, anti-virus, and anti-spyware) been disabled, but the anti-virus and anti-spyware definitions have also been deleted. You suspect that this is due to malware infection. Which of the following types of malware is the most likely cause of the

issue?

  1. Whack-A-Mole

  2. FireKiller 2000

  3. Beast

  4. SubSeven

Answer: B

Question No: 133 – (Topic 1)

A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

  1. Disable ActiveX Controls

  2. Disable Active Scripting

  3. Implement File Integrity Auditing

  4. Configure Security Logs

Answer: A,B

Question No: 134 – (Topic 1)

Which of the following is the practice of a domain name registrant using the five-day quot;grace periodquot; (the Add Grace Period or AGP) at the beginning of the registration of an ICANN- regulated second-level domain to test the marketability of the domain?

  1. Proxy server

  2. Domain tasting

  3. NMap

  4. PsPasswd

Answer: B

Question No: 135 – (Topic 1)

Which of the following applications would be considered a data warehousing application?

  1. Golf score tracking

  2. Badge reader

  3. Fraud detection

  4. eCommerce site

Answer: C

Question No: 136 – (Topic 1)

Olive is the program manager for her organization. She has created a request for proposal for a large portion of her program. In this work to be procured she has set several requirements for the vendors to participate. The chief among these requirements is a vendor must have at least four licensed electricians in his team. This requirement for four licensed electricians is an example of which one of the following terms?

  1. Vendor analysis requirements

  2. Scoring model

  3. Evaluation criteria

  4. Screening system

Answer: D

Question No: 137 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux- based network. You have configured a VPN server for remote users to connect to the company#39;s network. Which of the following encryption types will Linux use?

  1. CHAP

  2. MSCHAP

  3. RC2

  4. 3DES

Answer: D

Question No: 138 – (Topic 1)

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

  1. Backup

  2. Symmetric encryption

  3. Firewall

  4. Antivirus

Answer: D

Question No: 139 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?

  1. RSA

  2. Diffie-Hellman

  3. Twofish

  4. Blowfish

Answer: B

Topic 2, Volume B

Question No: 140 – (Topic 2)

You work as a Network Administrator for NetPerfect Inc. You have implemented a firewall on the company#39;s network. You want to ensure that outside users cannot access the internal FTP servers on the network. What will you do to accomplish the task?

  1. Block the TCP port 443 on the firewall.

  2. Block the UDP port 1701 and TCP port 1723 on the firewall.

  3. Block the TCP port 80 on the firewall.

  4. Block the TCP ports 20 and 21 on the firewall.

Answer: D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE