Reliable GIAC Information Security GSLC Dumps PDF Mar 13, 2025 Recently Updated Questions [Q174-Q194]

Rate this post

Reliable GIAC Information Security GSLC Dumps PDF Mar 13, 2025 Recently Updated Questions

Pass Your GIAC GSLC Exam with Correct 590 Questions and Answers

NO.174 Which of the following statements about Digest authentication are true?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NO.175 Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

 
 
 
 

NO.176 Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

 
 
 
 
 

NO.177 You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you’ll first need to understand all of the following except for which one?

 
 
 
 

NO.178 John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.
Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.179 Which of the following attributes is a tool that does not aid the project manager in quality planning?

 
 
 
 

NO.180 Which of the following types of virus is capable of changing its signature to avoid detection?

 
 
 
 

NO.181 You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.
Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 
 

NO.182 In which of the following does a Web site store information such as user preferences to provide customized services to users?

 
 
 
 

NO.183 You work as a Network Administrator in a company. The NIDS is implemented on the network.
You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

 
 
 
 

NO.184 Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

 
 
 
 

NO.185 John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He wants to test the response of a DDoS attack on the we-are-secure server. To accomplish this, he takes the following steps:
Instead of directly attacking the target computer, he first identifies a less secure network named

Infosecure that contains a network of 100 computers.
He breaks this less secure network and takes control of all its computers. After completing this step, he

installs a DDoS attack tool on each computer of the Infosecure network.
Finally, he uses all the computers of the less secure network to carry out the DDoS attack on the we-

are-secure server.
Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.186 Which of the following attacks can be performed by Brutus for cracking a password?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NO.187 CORRECT TEXT
Fill in the blank with the appropriate tool name.
________ is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.

NO.188 Which of the following wireless standards has a transmission speed of up to 720 Kbps?

 
 
 
 

NO.189 A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

 
 
 
 

NO.190 Which of the following processes is described in the statement below?
“This is the process of numerically analyzing the effect of identified risks on overall project objectives.”

 
 
 
 

NO.191 You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required.
Which of the following are the steps you should take to secure network printers?
Each correct answer represents a complete solution. Choose two.

 
 
 
 
 

NO.192 You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

 
 
 
 

NO.193 Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn’t specifically ask for the added features. This scenario is an example of which one of the following?

 
 
 
 

NO.194 An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

 
 
 
 

Latest 2025 Realistic Verified GSLC Dumps: https://www.test4engine.com/GSLC_exam-latest-braindumps.html

         

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below