[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 361-370

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 361 – (Topic 3)

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

  • What ports are open on our network systems

  • What hosts are available on the network

  • Identify unauthorized wireless access points

  • What services (application name and version) those hosts are offering

  • What operating systems (and OS versions) they are running

  • What type of packet filters/firewalls are in use Which of the following tools is Victor using?

    1. Nmap

    2. Sniffer

    3. Kismet

    4. Nessus

    Answer: A

    Question No: 362 – (Topic 3)

    In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

    1. In person attack

    2. Third-party authorization attack

    3. Important user posing attack

    4. Impersonation attack

    Answer: D

    Question No: 363 – (Topic 3)

    Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

    1. Macro

    2. Polymorphic

    3. Logic Bomb

    4. Boot sector

    Answer: B

    Question No: 364 – (Topic 3)

    Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?

    1. Project Cost Management

    2. Project Integration Management

    3. Project Time Management

    4. Project Scope Management

    5. Project Quality Management

    Answer: A

    Question No: 365 – (Topic 3)

    Which of the following uses public key cryptography to encrypt the contents of files?

    1. NTFS

    2. DFS

    3. RFS

    4. EFS

    Answer: D

    Question No: 366 – (Topic 3)

    Complete the following sentence: Quality control is a(n) process while quality assurance is a(n) process.

    1. Inspection, costly

    2. Management, inspection

    3. Inspection, prevention

    4. Prevention, inspection.

    Answer: C

    Question No: 367 – (Topic 3)

    Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

  • Network diagrams of the we-are-secure infrastructure

  • Source code of the security tools

  • IP addressing information of the we-are-secure network

  • Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

    1. Blackbox

    2. Alpha testing

    3. Whitebox

    4. Graybox

    Answer: C

    Question No: 368 – (Topic 3)

    Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

    1. It is the core routing protocol of the Internet.

    2. It was designed as a replacement for TELNET and other insecure shells.

    3. It is a network protocol used primarily on Linux and Unix based systems.

    4. It allows data to be exchanged using a secure channel between two networked devices.

    Answer: B,C,D

    Question No: 369 – (Topic 3)

    Tim is working as a project manager for the TCH project. The project is in the final stages and the closing processes are being performed. He has prepared the lessons learned document. This document will be the part of .

    1. The project#39;s performance record

    2. The project charter

    3. The risk register

    4. The company#39;s organizational process assets

    Answer: D

    Question No: 370 – (Topic 3)

    You are a project manager for a recycling company. You are in the process of reviewing proposals from sellers for recycling equipment. You notice the scope statement states the company required to abide by the environmental agencies regulations regarding waste. As a result, you select proposals that automatically include features such as scrubbers and baghouses to reduce hazardous waste. Which of the following is true regarding the scope statement?

    1. It includes an introductory schedule management plan.

    2. Knowing the limits and the projects required helps determine the resources to purchase.

    3. It is a deliverable-oriented collection of project components.

    4. It is the methods and procedures an organization must follow to create the activity list.

    Answer: B

    100% Free Download!
    Download Free Demo:GSLC Demo PDF
    100% Pass Guaranteed!
    Download 2017 CollectDumps GSLC Full Exam PDF and VCE

    CollectDumps ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 CollectDumps IT Certification PDF and VCE