This page was exported from Exam for engine [ http://blog.test4engine.com ] Export date:Tue Mar 25 23:28:34 2025 / +0000 GMT ___________________________________________________ Title: Reliable GIAC Information Security GSLC Dumps PDF Mar 13, 2025 Recently Updated Questions [Q174-Q194] --------------------------------------------------- Reliable GIAC Information Security GSLC Dumps PDF Mar 13, 2025 Recently Updated Questions Pass Your GIAC GSLC Exam with Correct 590 Questions and Answers NO.174 Which of the following statements about Digest authentication are true?Each correct answer represents a complete solution. Choose two.  Digest authentication is a more secure authentication method as compared to Basic authentication.  In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.  Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.  In Digest authentication, passwords are sent across a network as clear text, rather than as a has value. NO.175 Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?  Asymmetric encryption  Database encryption  XML encryption  Symmetric encryption Section: Volume DExplanation/Reference:NO.176 Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?  18 U.S.C. 2510  18 U.S.C. 1362  18 U.S.C. 1030  18 U.S.C. 2701  18 U.S.C. 1029 NO.177 You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you’ll first need to understand all of the following except for which one?  Summary milestone for the likely project phases  Measurable project objectives and related success criteria  Summary budget  Quality improvement program your company uses NO.178 John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?Each correct answer represents a complete solution. Choose all that apply.  The site should force its users to change their passwords from time to time.  The site should use CAPTCHA after a specific number of failed login attempts.  The site should increase the encryption key length of the password.  The site should restrict the number of login attempts to only three times. NO.179 Which of the following attributes is a tool that does not aid the project manager in quality planning?  Benchmarking practices  Design of experiments  Media selection  Benefit of analysis NO.180 Which of the following types of virus is capable of changing its signature to avoid detection?  Polymorphic virus  Boot sector virus  Macro virus  Stealth virus NO.181 You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.Which of the following actions will you perform to accomplish the task?Each correct answer represents a complete solution. Choose all that apply.  Implement the IEEE 802.1X authentication for the wireless network.  Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.  Implement the open system authentication for the wireless network.  Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.  Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only. NO.182 In which of the following does a Web site store information such as user preferences to provide customized services to users?  Keyword  Cookie  Protocol  ActiveX control NO.183 You work as a Network Administrator in a company. The NIDS is implemented on the network.You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?  Half duplex  Promiscuous  Full Duplex  Audit mode NO.184 Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?  VPN  Intranet  Extranet  WEP NO.185 John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He wants to test the response of a DDoS attack on the we-are-secure server. To accomplish this, he takes the following steps:Instead of directly attacking the target computer, he first identifies a less secure network namedInfosecure that contains a network of 100 computers.He breaks this less secure network and takes control of all its computers. After completing this step, heinstalls a DDoS attack tool on each computer of the Infosecure network.Finally, he uses all the computers of the less secure network to carry out the DDoS attack on the we-are-secure server.Which of the following tools can John use to accomplish the task?Each correct answer represents a complete solution. Choose all that apply.  Stacheldraht  Trin00  TFN  BackOfficer Friendly NO.186 Which of the following attacks can be performed by Brutus for cracking a password?Each correct answer represents a complete solution. Choose two.  Hybrid attack  Replay attack  Brute force attack  Man-in-the-middle attack Section: Volume DNO.187 CORRECT TEXTFill in the blank with the appropriate tool name.________ is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters. WEPcrackNO.188 Which of the following wireless standards has a transmission speed of up to 720 Kbps?  IEEE 802.11a  Infrared  Bluetooth  Wi-Fi NO.189 A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?  Vulnerability attack  Denial-of-Service attack  Impersonation attack  Social Engineering attack NO.190 Which of the following processes is described in the statement below?“This is the process of numerically analyzing the effect of identified risks on overall project objectives.”  Identify Risks  Perform Quantitative Risk Analysis  Monitor and Control Risks  Perform Qualitative Risk Analysis NO.191 You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required.Which of the following are the steps you should take to secure network printers?Each correct answer represents a complete solution. Choose two.  Remove the printers from the network and do not allow remote printing.  Ensure that the printers hard drive is scanned for spyware.  Secure all remote administrative protocols such as telnet.  Do not allow duplicate print jobs.  Limit the size of print jobs on the printer. NO.192 You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?  Use Incident handling  Use SMART model  Use OODA loop  Use Information assurance Section: Volume CNO.193 Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn’t specifically ask for the added features. This scenario is an example of which one of the following?  Scope creep  Gold plating  Change management  Value added change NO.194 An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?  PDA Hijacking  Session Hijacking  Privilege Escalation  Bluesnarfing  Loading … Latest 2025 Realistic Verified GSLC Dumps: https://www.test4engine.com/GSLC_exam-latest-braindumps.html --------------------------------------------------- Images: https://blog.test4engine.com/wp-content/plugins/watu/loading.gif https://blog.test4engine.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2025-03-13 09:32:54 Post date GMT: 2025-03-13 09:32:54 Post modified date: 2025-03-13 09:32:54 Post modified date GMT: 2025-03-13 09:32:54