[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSLC Dumps with VCE and PDF 91-100

CollectDumps 2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 91 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server

thinking that the following protocols of the We-are-secure server are being used in the network:



Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer#39;s log file?

Each correct answer represents a complete solution. Choose all that apply.

  1. SSH

  2. SSL

  3. HTTP

  4. IPSec

Answer: A,B,D

Question No: 92 – (Topic 1)

Which interface does an IPS sensor use to communicate with a security appliance for management purposes?

  1. Management interface

  2. User interface

  3. Command and control interface

  4. Monitoring interface

Answer: C

Question No: 93 – (Topic 1)

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

  1. IDS

  2. Snort

  3. Firewall

  4. WIPS

Answer: D

Question No: 94 – (Topic 1)

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

  1. Identifying the risk

  2. Finding an economic balance between the impact of the risk and the cost of the countermeasure

  3. Identifying the accused

  4. Assessing the impact of potential threats

Answer: A,B,D

Question No: 95 – (Topic 1)

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

  1. Implement WEP

  2. Don#39;t broadcast SSID

  3. Implement MAC filtering

  4. Implement WPA

Answer: B

Question No: 96 – (Topic 1)

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

  1. JPlag

  2. BackTrack

  3. Vedit

  4. Ettercap

Answer: B

Question No: 97 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate word.

A is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people#39;s computer systems.

Answer: honeypot

Question No: 98 – (Topic 1)

Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.

A. 18 U.S.C. 2510

B. 18 U.S.C. 1029

C. 18 U.S.C. 1028

D. 18 U.S.C. 1030

Answer: A,B,D

Question No: 99 – (Topic 1)

Which of the following provides the best protection against a man-in-the-middle attack?

  1. Strong encryption

  2. Fiber-optic cable

  3. Firewall

  4. Strong password

Answer: A

Question No: 100 – (Topic 1)

One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PDA. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?

  1. Blue snarfing

  2. A virus

  3. Spam

  4. Blue jacking

Answer: D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSLC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE