[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 311-320

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 311 – (Topic 3)

Mark works as a Network Administrator for Technet Inc. The company has a Windows 2003 domainbased network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the RAID-5 volume?

  1. Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.

  2. Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

  3. Use Disk Management, select the failed drive, and then regenerate the volume.

  4. Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.

Answer: A

Question No: 312 – (Topic 3)

You work as a Network Administrator for Net Perfect Inc. The company#39;s intranet Web site netperfect.com uses a digital certificate issued by the company#39;s Enterprise Certificate Authority. The Enterprise Certificate Authority is located on a server named certificates.netperfect.com. Kate, a user, complains that she is unable to access the secure Web site on her computer using Internet Explorer. An error message appears stating that the digital certificate is not from a trusted source. What is the most likely cause?

  1. Kate#39;s computer is not configured with the digital certificate.

  2. The company#39;s intranet server is not configured to support remote connections.

  3. Kate is not a member of the Administrators group.

  4. Kate is not using https protocol to connect to the secure Web site.

Answer: A

Question No: 313 – (Topic 3)

Which of the following is used to translate domain names into the numerical (binary)

identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide?

  1. DFSR

  2. DNS

  3. DFS

  4. EFS

Answer: B

Question No: 314 – (Topic 3)

In which of the following malicious hacking steps does email tracking come under?

  1. Maintaining Access

  2. Gaining access

  3. Reconnaissance

  4. Scanning

Answer: C

Question No: 315 – (Topic 3)

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

A. 24171811

B. 24171311

C. 24619311

D. 24171111

Answer: C

Question No: 316 – (Topic 3)

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

  1. Electronic Communications Privacy Act of 1986

  2. Wiretap Act

  3. Computer Fraud and Abuse Act

  4. Economic Espionage Act of 1996

Answer: A

Question No: 317 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Collectdumps 2017 PDF and VCE

Which of the following tools is John using to crack the wireless encryption keys?

  1. Kismet

  2. PsPasswd

  3. AirSnort

  4. Cain

Answer: C

Question No: 318 – (Topic 3)

Donna is the project manager for her organization. She is preparing a plan to manage changes to the project should changes be requested. Her change management plan defines the process for documenting, tracking, and determining if the changes should be approved or declined. What system is considered the parent of the change control system

documented in Donna#39;s plan?

  1. Project Management Information System

  2. Change Control System

  3. Integrated Change Control System

  4. Quality Management System

Answer: A

Question No: 319 – (Topic 3)

Which of the following is a fake target that deters hackers from locating your real network?

  1. Malware

  2. Honeypot

  3. KFSensor

  4. Spyware

Answer: B

Question No: 320 – (Topic 3)

Which of the following are the benefits of information classification for an organization? Each correct answer represents a complete solution. Choose two.

  1. It helps identify which information is the most sensitive or vital to an organization.

  2. It ensures that modifications are not made to data by unauthorized personnel or processes.

  3. It helps reduce the Total Cost of Ownership (TCO).

  4. It helps identify which protections apply to which information.

Answer: A,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE