[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 201-210

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 201 – (Topic 2)

Which of the following is responsible for assuring the quality of the deliverables in a project?

  1. Quality assurance (QA) manager

  2. Quality control (QC) manager

  3. Stakeholder

  4. Project manager

Answer: D

Question No: 202 – (Topic 2)

Dawn is the project manager of the HQQ Project and she believes the project work is done. She has prepared the final project report, which includes information on the financial performance, schedule performance, and project team performance in the project. All of the following documents are used to measure the completeness of the project scope except for which one?

  1. Project charter

  2. Project WBS Dictionary

  3. Project scope statement

  4. Project WBS

Answer: A

Question No: 203 – (Topic 2)

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as .

  1. Spambots

  2. Logic bombs

  3. Chain letters

  4. Virus hoaxes

  5. Time bombs

Answer: D

Question No: 204 – (Topic 2)

PassGuide Research and Training Center is developing its new network model. Which of

the following protocols should be implemented in the new network? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. IPX/SPX

  2. NetBEUI

  3. TCP/IP

  4. AppleTalk

Answer: C,D

Question No: 205 – (Topic 2)

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use the Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

  1. Hidden partition

  2. Dumb space

  3. Slack space

  4. Unused sectors

Answer: A,C,D

Question No: 206 – (Topic 2)

You are the project manager for the GHY Organization. A stakeholder has presented a change to your project that will cause the project scope to increase considerably. You are considering the change for approval and you need to review the impact of the change on all areas of the project. What change control system component is responsible for guiding the review of the impact of all changes on the project management knowledge areas?

  1. Scope change control system

  2. Change control system

  3. Configuration management

  4. Integrated change control

Answer: D

Question No: 207 – (Topic 2)

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

  1. It is likely to increase network traffic and slow down network performance.

  2. An unauthorized WAP is one way for hackers to get into a network.

  3. None, adding a wireless access point is a common task and not a security risk.

  4. This circumvents network intrusion detection.

Answer: B

Question No: 208 – (Topic 2)

You are the project manager of a large project that will span several time zones. You#39;ll be utilizing project team members from across several departments. Project team members won#39;t be working on the project full-time and will join and leave the project based on assignments in the project schedule.

What project management plan can you create to help you manage when project times will be brought onto and released from the project team?

  1. Staffing management plan

  2. Team management plan

  3. Project management plan

  4. Human resources management plan

Answer: A

Question No: 209 – (Topic 2)

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  1. Risk transfer

  2. Risk acceptance

  3. Risk avoidance

  4. Risk mitigation

Answer: A

Question No: 210 – (Topic 2)

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Contamination

  2. Eradication

  3. Recovery

  4. Identification

  5. Preparation

Answer: A,B,C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE