[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 341-350

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 341 – (Topic 3)

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

  1. Stealth

  2. Multipartite

  3. Boot sector

  4. File

Answer: B,C

Question No: 342 – (Topic 3)

Which of the following work as traffic monitoring tools in the Linux operating system? Each correct answer represents a complete solution. Choose two.

  1. IPTraf

  2. Hotspotter

  3. Ntop

  4. John the Ripper

Answer: A,C

Question No: 343 – (Topic 3)

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

  1. Soften

  2. Blur

  3. Sharpen

  4. Rotate

Answer: B

Question No: 344 – (Topic 3)

Which of the following protocols is used for destination and error reporting functions in datagram processing?

  1. PPP

  2. SRP

  3. NTP

  4. ICMP

Answer: D

Question No: 345 – (Topic 3)

It is the technique for gathering information for a Web site owner about a user through a few lines of code that reside in the Web pages. This information is gathered through

.

  1. Spambot

  2. Spyware

  3. Web Bugs

  4. Bogus spyware removal programs

Answer: C

Question No: 346 – (Topic 3)

Which of the following attacks is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker?

  1. Adaptive chosen-ciphertext

  2. Chosen-ciphertext

  3. Chosen-plain-supermodel

  4. Related-key

Answer: D

Question No: 347 – (Topic 3)

Which of the following processes is described in the statement below?

quot;It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project.quot;

  1. Identify Risks

  2. Perform Quantitative Risk Analysis

  3. Perform Qualitative Risk Analysis

  4. Monitor and Control Risks

Answer: D

Question No: 348 – (Topic 3)

Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?

  1. SSL

  2. MS-CHAP v2

  3. EFS

  4. WEP

Answer: A

Question No: 349 – (Topic 3)

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

  1. WEP

  2. WPA-PSK

  3. WPA2 -EAP

  4. WPA-EAP

Answer: A,B

Question No: 350 – (Topic 3)

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the

following precaution methods should you apply to keep your computer safe from such issues?

  1. Use Incident handling

  2. Use SMART model

  3. Use OODA loop

  4. Use Information assurance

Answer: B

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE