[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 161-170

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 161 – (Topic 2)

Which of the following authentication methods is used to enable a Web browser to provide credentials when making a request during an HTTP transaction?

  1. Anonymous authentication

  2. Basic authentication

  3. Digest authentication

  4. Integrated Windows authentication

Answer: B

Question No: 162 – (Topic 2)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP- based network environment. The network contains a Cisco Catalyst router to connect the internal network to the Internet. You want to secure your network from various attacks such as virus, spam, spyware, phishing, etc. You want to secure the whole network through a separate hardware device. Which of the following will you use?

  1. PIX-Firewall

  2. IDS

  3. IPS

  4. ASA

Answer: D

Question No: 163 – (Topic 2)

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

  1. Console

  2. Firewall

  3. Modem

  4. Gateway

  5. Sensor

Answer: A,E

Question No: 164 – (Topic 2)

Which of the following tools provides a visual diagram of a network?

  1. Network Mapper

  2. Network analyzer

  3. Time Domain Reflectometer (TDR)

  4. System Monitor

Answer: A

Question No: 165 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company#39;s network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients.

The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

  1. Take the root CA offline after it issues certificates to its subordinate CAs.

  2. Take the subordinate CA offline after it gets the certificates from the root CA.

  3. Place all CA servers in a locked room.

  4. Configure a firewall on the network.

Answer: A

Question No: 166 – (Topic 2)

Which of the following functions can you use to mitigate a command injection attack? Each correct answer represents a complete solution. Choose all that apply.

  1. escapeshellcmd()

  2. escapeshellarg()

  3. htmlentities()

  4. strip_tags()

Answer: A,B

Question No: 167 – (Topic 2)

Which of the following attributes is a tool that does not aid the project manager in quality planning?

  1. Benchmarking practices

  2. Design of experiments

  3. Media selection

  4. Benefit of analysis

Answer: C

Question No: 168 – (Topic 2)

Which of the following attacks does Management Frame Protection help to mitigate? Each correct answer represents a complete solution. Choose two.

  1. Replay attack

  2. DoS attack

  3. DDoS attack

  4. Man-in-the-middle attack

Answer: B,D

Question No: 169 – (Topic 2)

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as .

  1. Stealth virus

  2. Multipartite virus

  3. File virus

  4. Polymorphic virus

  5. Boot sector virus

Answer: C

Question No: 170 – (Topic 2)

Which of the following protocols provides mail forwarding and information storing features?

  1. IMAP

  2. SMTP

  3. SNMP

  4. POP

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE