[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 71-80

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 71 – (Topic 1)

Which of the following is used to communicate with an authentication server commonly used in UNIX networks?

  1. MS-CHAP

  2. IPX/SPX

  3. SMTP

  4. TACACS

Answer: D

Question No: 72 – (Topic 1)

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of www.gentech.com. She is using dumpster diving to gather information about Gentech Inc. In which of the following steps of malicious hacking does dumpster diving come under?

  1. Multi-factor authentication

  2. Role-based access control

  3. Mutual authentication

  4. Reconnaissance

Answer: D

Question No: 73 – (Topic 1)

You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?

  1. Buesnarfing

  2. DOS

  3. The evil twin attack

  4. WAP cloning

Answer: C

Question No: 74 – (Topic 1)

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

  1. The distortion technique

  2. The substitution technique

  3. The cover generation technique

  4. The spread spectrum technique

Answer: A

Question No: 75 – (Topic 1)

You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their

presence and shut down their access. Which of the following is the best way to address this issue?

  1. Implement a strong password policy.

  2. Implement a honey pot.

  3. Implement a strong firewall.

  4. Implement network based anti virus.

Answer: B

Question No: 76 – (Topic 1)

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

  1. The network layer headers and the session layer port numbers

  2. The presentation layer headers and the session layer port numbers

  3. The transport layer port numbers and the application layer headers

  4. The application layer port numbers and the transport layer headers

Answer: C

Question No: 77 – (Topic 1)

The Project Procurement Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose two.

  1. Contract Administration

  2. Team Development

  3. Staff Acquisition

  4. Contract Closure

Answer: A,D

Question No: 78 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term.

NOTE. Do not use abbreviation.

is a configurable client identification that allows a client to communicate with a particular base station.

Answer: Service Set Identifier

Question No: 79 – (Topic 1)

John works as a Website Administrator in ABC Inc. The company has to set a privacy policy on all the computers. The policy requires John to restrict only third party cookies that do not have a compact private policy or that use personally identifiable information without a user#39;s implicit consent. He reports to the Technical Support Executive that he wants to set the policy. The Technical Support Executive asks him to configure the settings in the Privacy tab page. Which of the following privacy settings will John use to accomplish the task?

  1. High

  2. Low

  3. Block All Cookies

  4. The policy cannot be set.

Answer: B

Question No: 80 – (Topic 1)

Which of the following is a complete indexed set of records of the procurement process incorporated into the administrative closure process?

  1. Contract file

  2. Required resources and skills

  3. Required actions to complete the project scope

  4. Description of the work packages

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE