Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 5

Questions 61

John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:
A.

Social engineering

B.

DoS

C.

Trojan horse

D.

Replay attack

GIAC GSLC Premium Access
Questions 62

Which of the following is a process of monitoring data packets that travel across a network?

Options:
A.

SCP protocol

B.

Packet sniffing

C.

Rootkit

D.

ICMP

Questions 63

In which of the following does an attacker use multiple computers throughout the network that has been previously infected?

Options:
A.

Phishing

B.

DDOS

C.

DOS

D.

Sniffer

Questions 64

Which of the following viruses replaces the boot sector data with its own malicious code?

Options:
A.

Chernobyl

B.

Explore.Zip

C.

MBR

D.

Nimda

Questions 65

Which of the following is a software testing method that uses an internal perspective of the system to design test cases based on the internal structure?

Options:
A.

Water Fall

B.

Black box

C.

White box

D.

Gray box

Questions 66

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks except for which one?

Options:
A.

Implement the IPP printing capability.

B.

Conduct frequent scans for server vulnerabilities.

C.

Install the upgrades of Microsoft service packs.

D.

Implement effective firewalls.

Questions 67

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:
A.

Intrusion detection system (IDS)

B.

Demilitarized zone (DMZ)

C.

Packet filtering

D.

Firewall

Questions 68

What do spikes in a power line indicate?

Options:
A.

Interference superimposed onto the power line

B.

Momentary high voltage

C.

Prolonged loss of power

D.

Momentary low voltage

Questions 69

Which of the following is a network protocol that allows data to be exchanged using a secure channel between two networked devices?

Options:
A.

SSL

B.

FTP

C.

SSH

D.

SFTP

Questions 70

Which of the following is NOT a principle and practice of the 'Minimize the number of highconsequence targets' principle?

Options:
A.

Principle of least privilege

B.

Principle of separation of privileges, duties, and roles

C.

Principle of separation of domains

D.

Principle of trusted entities from untrusted entities

Questions 71

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:
A.

RSA

B.

TripleDES

C.

DES

D.

AES

Questions 72

Which firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network?

Options:
A.

Deep packet inspection

B.

Packet hosting

C.

Screened host

D.

Packet filtering

Questions 73

Which of the following encrypts its code differently with each infection or generation of infections?

Options:
A.

Boot sector virus

B.

Stealth virus

C.

Polymorphic virus

D.

Macro virus

Questions 74

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of four domain controllers, six Windows 2003 member servers, and 500 Windows XP Professional client computers. The PKI infrastructure is already configured on the network. The current configuration of the network allows only managers to use EFS on local computers. Sometimes Mark faces problems when managers lose their private keys due to the user profile becoming corrupt or being lost. Due to this, the files that were persistently encrypted by using the corresponding public key are inaccessible. He wants to restore access to the encrypted files as quickly as possible. What will he do to accomplish the task?

Options:
A.

Ask the managers to log on to the network with a new user account.

B.

Rename all the encrypted files and ask the managers to open the files.

C.

Configure key archival on certificate authority (CA).

D.

Ask the managers to use the Distributed file system (Dfs) to encrypt important files.

Questions 75

All of the following are the outputs of the Acquire Project Team process except for which one?

Options:
A.

Resource calendars

B.

Enterprise environmental factors

C.

Project staff assignments

D.

Project management plan updates