Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 10

Questions 136

Which of the following types of firewall ensures that the packets are part of the established session?

Options:
A.

Stateful inspection firewall

B.

Circuit-level firewall

C.

Switch-level firewall

D.

Application-level firewall

GIAC GSLC Premium Access
Questions 137

You are the project manager of the NJJ project. Your enterprise environmental factors require that you establish certain risk management rules regarding low risks within your project. What is the best policy for risks with low probability and low impact in the project management?

Options:
A.

These risks should be placed in the risk register.

B.

These risks should be identified, but dismissed.

C.

These risks should be accepted.

D.

These risks should be placed on a watchlist for future monitoring.

Questions 138

Which of the following statements are true about SSIDs?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

B.

SSIDs are case insensitive text strings and have a maximum length of 64 characters.

C.

SSID is used to identify a wireless network.

D.

Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

Questions 139

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Options:
A.

PDA Hijacking

B.

Session Hijacking

C.

Privilege Escalation

D.

Bluesnarfing

Questions 140

You are responsible for securing the network at a law firm. You are concerned about printer security.

What steps should you take to prevent printer security breaches?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Remove the printer's driver from user computers.

B.

Scan printer hard drives for spyware and viruses.

C.

Limit print jobs.

D.

Secure any administrative connections (SSH, Telnet, etc.) to printers.

Questions 141

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We-are- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

Options:
A.

A buffer overflow

B.

An XSS attack

C.

A SQL injection attack

D.

A Denial-of-Service attack

Questions 142

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:
A.

File-based

B.

Anomaly-based

C.

Signature-based

D.

Network-based

Questions 143

You are the project manager of the HQQ Project for your company. You are working with your project stakeholders to discuss the risks in the project that can adversely affect the project objectives. You are discussing the possibilities of causes for an identified risk event in your project. Your stakeholder is confused on the difference between causes and risk events. Which of the following is NOT an example of a cause for a project risk?

Options:
A.

Schedule constraints on the project

B.

Limited team members to complete the project work

C.

Quality assurance programs within the company

D.

Work permit requirements

Questions 144

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

SARA

B.

Snort

C.

Tripwire

D.

Samhain

Questions 145

PassGuide Research and Training Center is developing its new network model. Which of the following protocols should be implemented in the new network? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

Options:
A.

IPX/SPX

B.

NetBEUI

C.

TCP/IP

D.

AppleTalk

Questions 146

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain based network. The network contains four Windows Server 2008 member servers with different roles and 120 Windows Vista client computers. Mark has implemented a Streaming Media Services server on the network. Users complain that they are unable to view the contents when using their Windows Media Players. Mark investigates and finds that the firewall only allows ports 80 and 443 for traffic. Mark wants to ensure that the users can view the contents. What will Mark to do to accomplish the task?

Options:
A.

Configure firewall to allow port 110

B.

Re-install Windows Media player on the users' computers

C.

Configure firewall to allow port 25

D.

Enable HTTP Streaming

Questions 147

What is a stakeholder analysis chart?

Options:
A.

It is a matrix that identifies who must communicate with whom.

B.

It is a matrix that identifies all of the stakeholders and to whom they must report to.

C.

It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.

D.

It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.

Questions 148

Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

Options:
A.

SWOT analysis

B.

Delphi technique

C.

Isolated pilot groups

D.

Root cause analysis

Questions 149

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:
A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

Questions 150

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:
A.

Polymorphic virus

B.

Boot sector virus

C.

Macro virus

D.

Stealth virus