Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 4

Questions 46

You are the project manager for the TTR project. You are in the process of gathering information for risk identification. You ask experts to participate in the process through their emails for maintaining anonymity. You collect the responses, summarize them, and are then re-circulated to the experts for further comment. Which of the following techniques are you using for risk identification?

Options:
A.

SWOT analysis

B.

Delphi

C.

Expert judgment

D.

Brainstorming

GIAC GSLC Premium Access
Questions 47

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

DES

B.

Blowfish

C.

IDEA

D.

RC4

Questions 48

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

Options:
A.

Rainbow attack

B.

SYN flood attack

C.

Zero Day attack

D.

FMS attack

Questions 49

What does noise in a power line indicate?

Options:
A.

Power degradation that is low and less than normal

B.

Interference superimposed onto the power line

C.

Momentary high voltage

D.

Prolonged loss of power

Questions 50

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

HTTP

B.

TLS

C.

SNMP

D.

SSL

Questions 51

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

Options:
A.

STP

B.

UDP

C.

TCP

D.

SNMP

Questions 52

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:
A.

Keyword

B.

Cookie

C.

Protocol

D.

ActiveX control

Questions 53

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Questions 54

Which type of repudiation states that the creator of the message denies ever creating the message even after creating it?

Options:
A.

Repudiation of submission

B.

Repudiation of creation

C.

Repudiation of receipt

D.

Repudiation of origin

Questions 55

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:
A.

Building up an incident response kit

B.

Setting up the initial position after an incident

C.

Working with QA to validate security of the enterprise

D.

Organizing a solution to remove an incident

Questions 56

Which of the following is used to detect malicious activity such as port scans or even attempts for cracking into computers by monitoring network traffic?

Options:
A.

IIPS

B.

NIDS

C.

PIDS

D.

HIDS

Questions 57

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

Options:
A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

Questions 58

You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.

You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.

What is the most likely cause?

Options:
A.

The group policy is not enabled for the domain.

B.

You failed to add the CA certificate to the trusted root certification authorities container.

C.

Certificate enrollment and renewal is not enabled for the group policy.

D.

An enterprise CA is not online.

Questions 59

Which of the following is a physical or logical subnetwork that contains and exposes external services of an organization to a larger network, usually the Internet?

Options:
A.

NAT

B.

Firewall

C.

DMZ

D.

VLAN

Questions 60

Which of the following malware spread through the Internet and caused a large DoS attack in

1988?

Options:
A.

Morris worm

B.

LoveLetter worm

C.

SQL slammer worm

D.

Klez worm