Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers

Questions 1

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Stealth

B.

Multipartite

C.

Boot sector

D.

File

GIAC GSLC Premium Access
Questions 2

What is the major difference between a worm and a Trojan horse?

Options:
A.

A worm is a form of malicious program, while a Trojan horse is a utility.

B.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

C.

A worm is self replicating, while a Trojan horse is not.

D.

A worm spreads via e-mail, while a Trojan horse does not.

Questions 3

Mark works as a Network Administrator for NetTech Inc. Several employees of the company work from the remote locations. The company provides a dial-up connection to employees to connect to the company's network using remote access service. Mark wants to implement call back feature for the employees who are dialing for long distance. Which of the following protocols will he use for remote access services to accomplish the task?

Options:
A.

SLIP

B.

WEP

C.

UDP

D.

PPP

Questions 4

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:
A.

Implement WEP

B.

Don't broadcast SSID

C.

Implement MAC filtering

D.

Implement WPA

Questions 5

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

Options:
A.

The network layer headers and the session layer port numbers

B.

The presentation layer headers and the session layer port numbers

C.

The transport layer port numbers and the application layer headers

D.

The application layer port numbers and the transport layer headers

Questions 6

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:
A.

Your public key

B.

The recipient's private key

C.

The recipient's public key

D.

Your private key

Questions 7

Which of the following is a virus that can redirect the disk head to read another sector instead of the one in which it resides?

Options:
A.

Multipartite virus

B.

Macro virus

C.

Stealth virus

D.

Boot sector virus

Questions 8

You are a project manager of a construction project. You are documenting project purchasing decisions, specifying the approach, and identifying potential sellers. You are in which of the following processes?

Options:
A.

Plan Procurements

B.

Administer Procurements

C.

Close Procurements

D.

Conduct Procurements

Questions 9

Which of the following can provide security against man-in-the-middle attack?

Options:
A.

Strong data encryption during travel

B.

Firewall

C.

Anti-virus programs

D.

Strong authentication method

Questions 10

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domainbased network. The network contains five Windows 2003 member servers and 300 Windows XP Professional client computers. Mark is setting up a wireless network for the company. He is planning to implement 802.1x authentication for this new wireless network. Mark is not planning to use a public key infrastructure (PKI) and certificates for authentication. Mark also wants an encrypted authentication channel and a fast reconnect using cached session keys. Which of the following authentication methods will he use to accomplish the task?

Options:
A.

Protected EAP (PEAP)

B.

EAP-Transport Layer Security (EAP-TLS)

C.

Shared Key authentication

D.

Digest authentication

Questions 11

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:
A.

Steganography

B.

Email spoofing

C.

Social engineering

D.

Web ripping

Questions 12

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of www.gentech.com. She is using dumpster diving to gather information about Gentech Inc. In which of the following steps of malicious hacking does dumpster diving come under?

Options:
A.

Multi-factor authentication

B.

Role-based access control

C.

Mutual authentication

D.

Reconnaissance

Questions 13

Which of the following viruses/worms uses the buffer overflow attack?

Options:
A.

Code red worm

B.

Klez worm

C.

Nimda virus

D.

Chernobyl (CIH) virus

Questions 14

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:
A.

Snort

B.

RealSecure

C.

Tripwire

D.

StealthWatch

Questions 15

Which of the following processes is described in the statement below?

"It is a process of developing an approximation of the costs of the resources needed to complete project activities."

Options:
A.

Cost Control

B.

Cost Budgeting

C.

Activity Resource Estimating

D.

Cost Estimating