[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 141-150

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 141 – (Topic 2)

Which of the following tools is used to attack the Digital Watermarking?

  1. 2Mosaic

  2. Gifshuffle

  3. Active Attacks

  4. Steg-Only Attack

Answer: A

Question No: 142 – (Topic 2)

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides #39;security through obscurity#39;. What technique is Maria using?

  1. Public-key cryptography

  2. Steganography

  3. RSA algorithm

  4. Encryption

Answer: B

Question No: 143 – (Topic 2)

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

  1. WPA-PSK

  2. WPA-EAP

  3. WPA2

  4. WEP

Answer: C

Question No: 144 – (Topic 2)

Ned is the program manager for his organization and he#39;s considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

  1. IFB

  2. RFI

  3. RFP

  4. RFQ

Answer: B

Question No: 145 – (Topic 2)

Your company network has been infected with a virus. You have cleaned all PCs, workstations, and servers. However your network still keeps getting re-infected with the same virus. Which of the following could NOT be a cause for this?

Each correct answer represents a complete solution. Choose two.

  1. The virus is on UPS devices.

  2. Users are downloading the virus from emails.

  3. The virus is on printers.

  4. The virus has infected your network interface cards.

  5. Users have the virus on portable media such as a USB drive.

Answer: A,D

Question No: 146 – (Topic 2)

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

  1. Black-box testing

  2. White-box testing

  3. Unit testing

  4. Gray-box testing

Answer: A

Question No: 147 – (Topic 2)

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

  1. Smurf

  2. Denial of Service

  3. Virus

  4. Evil Twin

Answer: B

Question No: 148 – (Topic 2)

Which of the following statements correctly defines a script kiddie?

  1. He is an individual who uses hacking programs developed by others to attack information systems and spoil websites.

  2. He is an individual who is an expert in various computer fields such as operating systems, networking, hardware, software, etc. and enjoys the mental challenge of decoding computer programs, solving network vulnerabilities and security threats, etc.

  3. He is an individual who breaks communication systems to perform hacking.

  4. He is an individual who has lost respect and integrity as an employee in any organization.

Answer: A

Question No: 149 – (Topic 2)

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

  1. They can be removed completely by taking proper actions.

  2. They can be analyzed and measured by the risk analysis process.

  3. They are considered an indicator of threats coupled with vulnerability.

  4. They can be mitigated by reviewing and taking responsible actions based on possible risks.

Answer: B,C,D

Question No: 150 – (Topic 2)

Which of the following tools can be used to read NetStumbler#39;s collected data files and present street maps showing the logged WAPs as icons, whose color and shape indicates WEP mode and signal strength?

  1. NetStumbler

  2. WEPcrack

  3. StumbVerter

  4. Kismet

Answer: C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE