[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 171-180

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 171 – (Topic 2)

Which of the following tools can be used for the anti-phishing?

  1. Legion

  2. Spector

  3. Netcraft

  4. eblaster

Answer: C

Question No: 172 – (Topic 2)

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file:

(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)

When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

  1. NetStumbler

  2. AiroPeek

  3. Kismet

  4. AirSnort

Answer: A

Question No: 173 – (Topic 2)

The Project Scope Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

  1. Create Work Breakdown Structure (WBS)

  2. Control Scope

  3. Select Sellers

  4. Verify Scope

Answer: A,B,D

Question No: 174 – (Topic 2)

You are responsible for the security computers in college labs. Since a number of students have significant computer skills, you wish to make security impossible to breach through normal operating system based means. Furthermore, you want to have the security require a password that must be entered before the operating system even loads. What will you do to accomplish the task?

  1. Implement biometric security.

  2. Implement bios security that prevents the system from loading if the correct password is not entered.

  3. Implement an operating system password that prevents the system from loading if the correct password is not entered.

  4. Implement hard drive encryption with a password tied into the operating system password.

Answer: B

Question No: 175 – (Topic 2)

Which of the following is an example of penetration testing?

  1. Implementing HIDS on a computer

  2. Implementing NIDS on a network

  3. Configuring firewall to block unauthorized traffic

  4. Simulating an actual attack on a network

Answer: D

Question No: 176 – (Topic 2)

Which of the following statements about reconnaissance is true?

  1. It is a computer that is used to attract potential intruders or attackers.

  2. It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

  3. It describes an attempt to transfer DNS zone data.

  4. It is also known as half-open scanning.

Answer: C

Question No: 177 – (Topic 2)

You work as a technician for Tech Perfect Inc. A user named Rick calls you. He wants to configure a wireless network for his small office. He wants to adopt a wireless technology that supports high data transfer speed. Which of the following technologies will you suggest?

A. 802.11b

  1. Infrared

  2. Bluetooth

D. 802.11

Answer: A

Question No: 178 – (Topic 2)

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

  1. Single Loss Expectancy (SLE)

  2. Exposure Factor (EF)

  3. Annualized Rate of Occurrence (ARO)

  4. Safeguard

Answer: C

Question No: 179 – (Topic 2)

Which of the following applications work as mass-emailing worms? Each correct answer represents a complete solution. Choose two.

  1. Nimda virus

  2. I LOVE YOU virus

  3. Melissa virus

  4. Chernobyl virus

Answer: A,B

Question No: 180 – (Topic 2)

Which of the following tasks can be performed by a malicious bot/botnet? Each correct answer represents a complete solution. Choose all that apply.

  1. Harvesting email addresses from contact forms or guestbook pages.

  2. Performing a spoofing attack.

  3. Downloading entire Web site to suck the bandwidth of a target.

  4. Stealing various information like credit card numbers, login, ids, etc.

  5. Performing DDoS attacks.

Answer: A,C,D,E

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE