[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 281-290

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 281 – (Topic 2)

Which of the following terms is synonymous with the willful destruction of another person#39;s property?

  1. Spoofing

  2. Phishing

  3. Vandalism

  4. Hacking

    Answer: C

    Question No: 282 – (Topic 2)

    The 3-way handshake method is used by the TCP protocol to establish a connection between a client and the server. It involves three steps:

    1. In the first step, a SYN message is sent from a client to the server.

    2. In the second step, a SYN/ACK message is sent from the server to the client.

    3. In the third step, an ACK (usually called SYN-ACK-ACK) message is sent from the client to the server. At this point, both the client and the server have received acknowledgements of the TCP connection. If the Initial Sequence Numbers of the client and server were 241713111 and 241824111 respectively at the time when the client was sending the SYN message in the first step of the TCP 3-way handshake method, what will be the value of the acknowledgement number field of the server#39;s packet when the server was sending the SYN/ACK message to the client in the second step of the TCP 3-way handshake method?

      A. 241824111

      B. 241713112

      C. 241824112

      D. 241713111

      Answer: B

      Question No: 283 – (Topic 2)

      A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

      Each correct answer represents a complete solution. Choose all that apply.

      1. Wingate

      2. ToneLoc

      3. THC-Scan

      4. NetStumbler

Answer: B,C

Question No: 284 – (Topic 2)

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

  1. Dictionary attack

  2. Man-in-the-middle attack

  3. Denial-of-service attack

  4. Password guessing attack

Answer: B

Question No: 285 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. You install access points for enabling a wireless network.

The sales team members and the managers in the company will be using laptops to connect to the LAN through wireless connections. Therefore, you install WLAN network interface adapters on their laptops. However, you want to restrict the sales team members and managers from communicating directly to each other. Instead, they should communicate through the access points on the network. Which of the following topologies will you use to accomplish the task?

  1. Infrastructure

  2. Star

  3. Ad hoc

  4. Mesh

Answer: A

Question No: 286 – (Topic 2)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. All client computers on the network run Windows XP Professional. You configure a public key infrastructure (PKI) on the network. You configure a root CA and a subordinate CA on the network. For security reasons, you want to take the root CA offline. You are required to configure the CA servers to support for certificate revocation. Choose the steps you will require to accomplish the task.

Collectdumps 2017 PDF and VCE

A.

Answer: A

Question No: 287 – (Topic 2)

Which of the following is a part of a company#39;s network that lies in between the Internet and a private network?

  1. DNS caching-only server

  2. Firewall

  3. Demilitarized Zone (DMZ)

  4. Stub Zone

Answer: C

Question No: 288 – (Topic 2)

Which of the following RAID standards distributes data across multiple disks in a way that gives improved speed at any given instant?

  1. RAID 01

  2. RAID 3/4

  3. RAID 1

  4. RAID 0

Answer: D

Topic 3, Volume C

Question No: 289 – (Topic 3)

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise#39;s network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

  1. Spoofing

  2. Packet manipulation

  3. Denial-of-Service

  4. Eavesdropping

Answer: C

Question No: 290 – (Topic 3)

Which of the following firewalls inspects the actual contents of packets?

  1. Application-level firewall

  2. Packet filtering firewall

  3. Stateful inspection firewall

  4. Circuit-level firewall

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE