[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 251-260

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 251 – (Topic 2)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We-are-secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error #39;0x80040E14#39;

This error message shows that the We-are-secure Website is vulnerable to .

  1. A buffer overflow

  2. An XSS attack

  3. A SQL injection attack

  4. A Denial-of-Service attack

Answer: C

Question No: 252 – (Topic 2)

Your project is to implement a new operating system for all of the workstations in your company#39;s network. Every workstation must have the new operating system as part of an organization-wide mandate. Many users are not happy with this decision and are resisting the change. Some of the users are complaining that they do not want the operating system at all. What type of stakeholders are these users?

  1. Con stakeholders

  2. Customers

  3. Negative stakeholders

  4. End-users

Answer: C

Question No: 253 – (Topic 2)

Which of the following security protocols can be used to support MS-CHAPv2 for wireless client authentication?

Each correct answer represents a complete solution. Choose two.

  1. HTTP

  2. PEAP

  3. IPSec

  4. PPTP

Answer: B,D

Question No: 254 – (Topic 2)

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

  1. Pwdump

  2. EtherApe

  3. GFI LANguard

  4. Nessus

Answer: C,D

Question No: 255 – (Topic 2)

Andrew works as a Software Developer for Mansoft Inc. The company#39;s network has a Web server that hosts the company#39;s Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

  1. IPSec

  2. Symmetric

  3. Secret

  4. Asymmetric

Answer: B,D

Question No: 256 – (Topic 2)

You work as a Software Developer for PassGuide Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development

platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

  1. Cryptosystem

  2. Cryptographer

  3. Cryptographic toolkit

  4. Cryptanalyst

Answer: A

Question No: 257 – (Topic 2)

You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required. Which of the following are the steps you should take to secure network printers?

Each correct answer represents a complete solution. Choose two.

  1. Remove the printers from the network and do not allow remote printing.

  2. Ensure that the printers hard drive is scanned for spyware.

  3. Secure all remote administrative protocols such as telnet.

  4. Do not allow duplicate print jobs.

  5. Limit the size of print jobs on the printer.

Answer: B,C

Question No: 258 – (Topic 2)

A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it#39;ll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

  1. Add the identified risk to the issues log.

  2. Add the identified risk to a quality control management control chart.

  3. Add the identified risk to the low-level risk watchlist.

  4. Add the identified risk to the risk register.

Answer: D

Question No: 259 – (Topic 2)

You work in a company that accesses the Internet frequently. This makes the company#39;s files susceptible to attacks from unauthorized access. You want to protect your company#39;s network from external attacks. Which of the following options will help you in achieving your aim?

  1. Gopher

  2. FTP

  3. HTTP

  4. Firewall

Answer: D

Question No: 260 – (Topic 2)

Adam works as a Penetration Tester for Umbrella Inc. He is assigned a project of testing the security of the company#39;s network. He is using the Metasploit Framework for developing and executing exploit code against a remote target machine. The Metasploit Framework is the important sub-project of the Metasploit Project. Which of the following are the other sub-projects under the Metasploit projet?

Each correct answer represents a complete solution. Choose all that apply.

  1. shellcode archive

  2. Metasploit system

  3. Opcode Database

  4. security research

Answer: A,C,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE