[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 271-280

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 271 – (Topic 2)

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

  1. Password policies

  2. Data classification

  3. Vulnerability assessments

  4. Data encryption

Answer: A,B,C

Question No: 272 – (Topic 2)

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

  1. The attacker can exploit any protocol used to go into the internal network or intranet of the company.

  2. The attacker can perform a Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

  3. The attacker can gain access to the Web server in a DMZ and exploit the database.

  4. The attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

Answer: A,B

Question No: 273 – (Topic 2)

You are responsible for securing the network at a law firm. You are concerned about printer security.

What steps should you take to prevent printer security breaches? Each correct answer represents a complete solution. Choose two.

  1. Remove the printer#39;s driver from user computers.

  2. Scan printer hard drives for spyware and viruses.

  3. Limit print jobs.

  4. Secure any administrative connections (SSH, Telnet, etc.) to printers.

Answer: B,D

Question No: 274 – (Topic 2)

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

  1. portsentry

  2. nmap

  3. scanlogd

  4. libnids

Answer: A,C,D

Question No: 275 – (Topic 2)

Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?

  1. Digital signature

  2. Hash algorithm

  3. Public-key

  4. Quantum

Answer: B

Question No: 276 – (Topic 2)

Which of the following methods will allow data to be sent on the Internet in a secure format?

  1. Virtual Private Networks

  2. Serial Line Interface Protocol

  3. Browsing

  4. Point-to-Point Protocol

Answer: A

Question No: 277 – (Topic 2)

You see the career section of a company#39;s Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

  1. Covering tracks

  2. Scanning

  3. Gaining access

  4. Reconnaissance

Answer: D

Question No: 278 – (Topic 2)

You are writing the change management plan for your upcoming project. You want to address mistakes that could happen during the execution of the project. Your change management plan requires the project team to correct any errors that deviate from the project scope as an error is technically an unapproved scope change. What else should you address in regard to errors in project team execution?

  1. The schedule delays of the error must be documented.

  2. The corrective action for the errors must be followed by validating defect repair.

  3. The corrective action for the errors must be followed by quality control.

  4. The costs of the error must be documented.

Answer: B

Question No: 279 – (Topic 2)

Which method is used to configure several disk drives into a logical disk drive and provides faulttolerance, redundancy, lower latency, and higher bandwidth for read/write operations?

  1. DRM

  2. DAC

  3. RAID

  4. MAC

Answer: C

Question No: 280 – (Topic 2)

Which of the following encryption modes are possible in WEP?

Each correct answer represents a complete solution. Choose all that apply.

  1. 128 bit encryption

  2. 256 bit encryption

  3. 40 bit encryption

  4. No encryption

Answer: A,C,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE