[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 211-220

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 211 – (Topic 2)

You are working in a functional organization and are managing the IHH Project. Your project will likely last for six months and has a budget constraint of $1,876,000. You#39;ll be dealing with a functional manager to manage costs and resources in the project. Who will have authority over assigning the project team members to activities?

  1. Customers

  2. Project sponsor

  3. Functional manager

  4. Team leader

Answer: C

Question No: 212 – (Topic 2)

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

  1. Examining your firewall logs

  2. Examining your antivirus logs

  3. Examining your domain controller server logs

  4. Examining your DNS Server logs

Answer: A

Question No: 213 – (Topic 2)

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company#39;s network through wireless connections. The company#39;s management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option.

What will you do to enable Shared Key authentication?

  1. Install EAP-TLS

  2. Install PEAP-MS-CHAP v2

  3. Install Service Pack 1

  4. Enable WEP

Answer: D

Question No: 214 – (Topic 2)

Which of the following wireless security features provides the best wireless security mechanism?

  1. WPA with 802.1X authentication

  2. WPA with Pre Shared Key

  3. WEP

  4. WPA

Answer: A

Question No: 215 – (Topic 2)

Which of the following characteristics are related to biometrics? Each correct answer represents a complete solution. Choose two.

  1. Psychological

  2. Biological

  3. Physiological

  4. Behavioral

Answer: C,D

Question No: 216 – (Topic 2)

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are- secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below:

This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs.

The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME.

Which of the following viruses has the symptoms as the one described above?

  1. Nimda

  2. Chernobyl

  3. I Love You

  4. Melissa

Answer: B

Question No: 217 – (Topic 2)

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

  1. Recovery

  2. Containment

  3. Preparation

  4. Identification

Answer: B

Question No: 218 – (Topic 2)

John works as a Website Administrator in ABC Inc. The users of the company always use Internet Explorer for Web browsing. One of the users opens the Privacy tab page in the Internet Options dialog box and configures the privacy settings for the Internet zone as displayed in the following images:

Collectdumps 2017 PDF and VCE

Collectdumps 2017 PDF and VCE

Which of the following statements regarding the configurations are true? Each correct answer represents a complete solution. Choose all that apply.

  1. John has specifically blocked some websites from using cookies.

  2. John has set a privacy policy for websites in the Internet zone.

  3. John has specifically allowed some websites to use cookies.

  4. Hotmail.com and Yahoo.com will not use cookies regardless of their privacy policy.

Answer: A,B,C,D

Question No: 219 – (Topic 2)

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter

your email you@gmail.com#39; and press the submit button. The Web application displays the server error. What can be the reason of the error?

  1. The remote server is down.

  2. Email entered is not valid.

  3. Your internet connection is slow.

  4. You have entered any special character in email.

Answer: D

Question No: 220 – (Topic 2)

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Brute force attack

  2. Mail bombing

  3. Dictionary attack

  4. Spoofing

Answer: A,C,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE