[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 31-40

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 31 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.

Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

  1. Implement the IEEE 802.1X authentication for the wireless network.

  2. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

  3. Implement the open system authentication for the wireless network.

  4. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

  5. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

Answer: A,B,D

Question No: 32 – (Topic 1)

You are a Network Administrator in an enterprise. You have been assigned the task of installing Windows 2000 and some other applications, on each computer on the network. But in the enterprise environment, it is not cost effective to install Windows 2000 and other applications, using the standard interactive setup on each computer. You plan to perform automated installation on multiple computers. Which of the following installation tasks can be automated?

Each correct answer represents a complete solution. Choose all that apply.

  1. Service Packs for Windows 2000 Server.

  2. Any application that does not run as a service.

  3. Additional language support for Windows 2000 Server, through the installation of various language packs.

  4. Any application that runs as a service.

  5. The core operating system of Windows 2000 Server.

Answer: A,B,C,E

Question No: 33 – (Topic 1)

Which of the following heights of fence deters only casual trespassers?

  1. 3 to 4 feet

  2. 2 to 2.5 feet

  3. 8 feet

  4. 6 to 7 feet

Answer: A

Question No: 34 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

  1. Eavesdropping

  2. Fingerprinting

  3. Web ripping

  4. TCP FTP proxy scanning

Answer: C

Question No: 35 – (Topic 1)

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

  1. Attacker can use the Ping Flood DoS attack if WZC is used.

  2. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

  3. Attacker by creating a fake wireless network with high power antenna cause Victor#39;s computer to associate with his network to gain access.

  4. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Answer: B,C

Question No: 36 – (Topic 1)

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP

Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections.

According to the company#39;s security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company#39;s security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

  1. Configure the authentication type for the wireless LAN to Open system.

  2. Install a firewall software on each wireless access point.

  3. Configure the authentication type for the wireless LAN to Shared Key.

  4. Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

  5. Broadcast SSID to connect to the access point (AP).

  6. On each client computer, add the SSID for the wireless LAN as the preferred network.

Answer: C,D,F

Question No: 37 – (Topic 1)

You and your project team are just starting the risk identification activities for a project that is scheduled to last for 18 months. Your project team has already identified a long list of risks that need to be analyzed. How often should you and the project team do risk identification?

  1. Identify risks is an iterative process.

  2. At least once per month

  3. It depends on how many risks are initially identified.

  4. Several times until the project moves into execution

Answer: A

Question No: 38 – (Topic 1)

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  1. Qualitative analysis

  2. Quantitative analysis

  3. Risk identification

  4. Estimate activity duration

Answer: A

Question No: 39 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company#39;s headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

  1. Your public key

  2. The recipient#39;s private key

  3. The recipient#39;s public key

  4. Your private key

Answer: C

Question No: 40 – (Topic 1)

Which of the following standards is used in wireless local area networks (WLANs)?

  1. IEEE 802.4

  2. IEEE 802.3

  3. IEEE 802.11b

  4. IEEE 802.5

Answer: C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE