Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 11

Questions 151

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:
A.

Vulnerability attack

B.

Denial-of-Service attack

C.

Impersonation attack

D.

Social Engineering attack

GIAC GSLC Premium Access
Questions 152

Holly is the project manager of the GHQ Project for her organization. The project is using the AAA IT Integrators Corporation as a vendor to do a portion of the project work. Mitch Smith, the IT Directors for the AAA IT Integrators Corporation, reports that his team has completed the project work. Holly and her team review the deliverables and she confirms that Mitch's team has indeed completed the work according to the statement of work. What document should Holly refer to now to determine the next course of action with the AAA IT Integrators Corporation?

Options:
A.

Procurement management plan

B.

Statement of Work

C.

Contract

D.

Project management plan

Questions 153

David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

Options:
A.

Striped volume

B.

Spanned volume

C.

RAID-5 volume

D.

Mirrored volume

Questions 154

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. You install access points for enabling a wireless network. The sales team members and the managers in the company will be using laptops to connect to the LAN through wireless connections. Therefore, you install WLAN network interface adapters on their laptops. However, you want to restrict the sales team members and managers from communicating directly to each other. Instead, they should communicate through the access points on the network. Which of the following topologies will you use to accomplish the task?

Options:
A.

Infrastructure

B.

Star

C.

Ad hoc

D.

Mesh

Questions 155

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Wingate

B.

ToneLoc

C.

THC-Scan

D.

NetStumbler

Questions 156

Your customer wants the fastest wireless possible in his home. Which of the following would you recommend?

Options:
A.

802.11 wireless

B.

Satellite

C.

Bluetooth

D.

3G Cellular

Questions 157

Which of the following is an example of penetration testing?

Options:
A.

Implementing HIDS on a computer

B.

Implementing NIDS on a network

C.

Configuring firewall to block unauthorized traffic

D.

Simulating an actual attack on a network

Questions 158

Which of the following malware spread through the Internet and caused a large DoS attack in 1988?

Options:
A.

LoveLetter worm

B.

Klez worm

C.

Morris worm

D.

SQL slammer worm

Questions 159

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

Options:
A.

Spambots

B.

Logic bombs

C.

Chain letters

D.

Virus hoaxes

E.

Time bombs

Questions 160

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:
A.

Risk transfer

B.

Risk acceptance

C.

Risk avoidance

D.

Risk mitigation

Questions 161

GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which of the following cryptographic attacks can be used to break both ciphers?

Options:
A.

Man-in-the-middle attack

B.

Known plaintext attack

C.

Replay attack

D.

Ciphertext only attack

Questions 162

Which of the following penetration testing phases involves reconnaissance or data gathering?

Options:
A.

Attack phase

B.

Post-attack phase

C.

Pre-attack phase

D.

Out-attack phase

Questions 163

Which of the following types of attacks cannot be prevented by a firewall?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Ping flood attack

B.

Phishing attack

C.

Shoulder surfing attack

D.

URL obfuscation attack

Questions 164

Which of the following terms describes the statement given below?

"It provides the testers with complete knowledge of the infrastructure to be tested, often including network diagrams, source code, and IP addressing information."

Options:
A.

BackTrack

B.

GFI LANguard

C.

White box penetration testing

D.

Black box penetration testing

Questions 165

Dawn is the project manager of the HQQ Project and she believes the project work is done. She has prepared the final project report, which includes information on the financial performance, schedule performance, and project team performance in the project. All of the following documents are used to measure the completeness of the project scope except for which one?

Options:
A.

Project charter

B.

Project WBS Dictionary

C.

Project scope statement

D.

Project WBS