Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 6

Questions 76

Fill in the blank with the appropriate type of router.

A _________ router performs packet-filtering and is used as a firewall.

Options:
GIAC GSLC Premium Access
Questions 77

Which of the following is a popular replacement for halon gas?

Options:
A.

FM-200

B.

CO2

C.

SO2

D.

Ozone

Questions 78

Which of the following is a DNS database resource record containing the host DNS name and the IPv6 address?

Options:
A.

AAAA

B.

IPv6

C.

Bzip2

D.

HOST

Questions 79

Which of the following is a structured review of the procurement process originated at the Plan Procurements process?

Options:
A.

Procurement document package

B.

Administer Procurements process

C.

Procurement auditing

D.

Project Procurement Management

Questions 80

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:
A.

Reconnaissance

B.

File integrity auditing

C.

Shoulder surfing

D.

Spoofing

Questions 81

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Secret

B.

Synchronous

C.

Asymmetric

D.

Symmetric

Questions 82

Which of the following port numbers is used by the LDAP protocol when it is secured?

Options:
A.

335

B.

120

C.

442

D.

636

Questions 83

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

Options:
A.

I LOVE YOU

B.

Melissa

C.

Klez

D.

Boot sector

Questions 84

Which function of incident handling involves in-depth investigation of the incident report or incident activity to establish the priority and threat of the incident?

Options:
A.

Incident analysis

B.

Incident reporting

C.

Incident response

D.

Incident identification

Questions 85

In Which of the following types of white box testing are the test cases designed based on data flow within the code?

Options:
A.

Data flow testing

B.

Control flow testing

C.

Path testing

D.

Branch testing

Questions 86

You work as a Network Administrator in a company. The NIDS is implemented on the network. You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

Options:
A.

Half duplex

B.

Promiscuous

C.

Full Duplex

D.

Audit mode

Questions 87

Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?

Options:
A.

Zero-day

B.

IP spoofing

C.

Brute force

D.

FMS

Questions 88

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Options:
A.

Network anti-spyware software

B.

Network anti-virus software

C.

Site surveys

D.

Protocol analyzers

Questions 89

Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?

Options:
A.

NMap

B.

Domain tasting

C.

Proxy server

D.

PsPasswd

Questions 90

You work as a Network Administrator for Perfect Labs Inc. The company has a TCP/IP-based network, which is connected to the Internet. You want to provide Internet access to users. You are concerned about virus threats and want to protect the network against potential virus attacks from the Internet.

Which of the following steps will you take to minimize potential virus attacks?

Options:
A.

Install a virus protection program on each workstation.

B.

Run SCANDISK on each workstation.

C.

Configure a firewall in the network.

D.

Install a proxy server in the network.