[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 21-30

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 21 – (Topic 1)

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company#39;s intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

  1. FTP server

  2. VPN

  3. Microsoft Internet Information Server (IIS)

  4. Certificate server

Answer: D

Question No: 22 – (Topic 1)

Which of the following programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited?

  1. Spyware

  2. Honeypot

  3. Worm

  4. Malware

Answer: A

Question No: 23 – (Topic 1)

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

  1. Acceptance

  2. Transference

  3. Mitigation

  4. Avoidance

Answer: B

Question No: 24 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate tool name.

is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.

Answer: WEPcrack

Question No: 25 – (Topic 1)

An organization has a standardized change management plan that all project managers must adhere to. A project manager has worked with the Change Control Board in his organization to approve a change to project scope. What should the standardized change management plan require the project manager to do with the approved scope change?

  1. Perform risk assessment on the new change.

  2. Communicate the change to the vendor.

  3. Create a cost estimate for the change.

  4. Update the WBS.

Answer: D

Question No: 26 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate type of router.

A router performs packet-filtering and is used as a firewall.

Answer: screening

Question No: 27 – (Topic 1)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He wants to test the response of a DDoS attack on the we-are- secure server. To accomplish this, he takes the following steps:

Instead of directly attacking the target computer, he first identifies a less secure network named Infosecure that contains a network of 100 computers.

He breaks this less secure network and takes control of all its computers. After completing this step, he installs a DDoS attack tool on each computer of the Infosecure network.

Finally, he uses all the computers of the less secure network to carry out the DDoS attack on the we-are-secure server.

Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Stacheldraht

  2. Trin00

  3. TFN

  4. BackOfficer Friendly

Answer: A,B,C

Question No: 28 – (Topic 1)

You are the project manager for your organization and are trying to determine which vendor your organization will use. You have determined that any vendor that would like to bid on your project work will need to have a Microsoft Certified System Engineer on staff, have eight years of Cisco experience, and have at least two references from similar projects. What have you created in this scenario?

  1. Screening system for the vendors

  2. Weighting system for the vendors

  3. Preferred vendors list

  4. Bidders conference

Answer: A

Question No: 29 – (Topic 1)

Which of the following features of IE prevent users from a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

  1. Pop-up blocker

  2. Cookie

  3. Content Advisor

  4. Phishing Filter

Answer: D

Question No: 30 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are- secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

  1. The virus, used by John, is not in the database of the antivirus program installed on the server.

  2. John has created a new virus.

  3. The mutation engine of the virus is generating a new encrypted code.

  4. John has changed the signature of the virus.

Answer: A,B,C,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE