Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 7

Questions 91

Mark works as a Network Administrator for Technet Inc. The company has a Windows 2003 domainbased network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the RAID-5 volume?

Options:
A.

Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.

B.

Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

C.

Use Disk Management, select the failed drive, and then regenerate the volume.

D.

Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.

GIAC GSLC Premium Access
Questions 92

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

• It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

• It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:
A.

THC-Scan

B.

Kismet

C.

Absinthe

D.

NetStumbler

Questions 93

Which of the following firewalls inspects the actual contents of packets?

Options:
A.

Application-level firewall

B.

Packet filtering firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Questions 94

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:
A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

Questions 95

A Security administrator wants to configure policies that dictate what types of network traffic are allowed in the network. Which types of signature should he use to configure such type of policies?

Options:
A.

DoS signatures

B.

Connection signatures

C.

Exploit signatures

D.

String signatures

Questions 96

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

WEP key

B.

IP address of the router

C.

MAC address of the router

D.

SSID of the WLAN

Questions 97

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

SSHGuard

B.

nmap

C.

Fail2Ban

D.

portsentry

E.

OpenSSL

Questions 98

Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?

Options:
A.

Project Cost Management

B.

Project Integration Management

C.

Project Time Management

D.

Project Scope Management

E.

Project Quality Management

Questions 99

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:
A.

Auditing

B.

Packet filtering

C.

Authentication

D.

Hacking

Questions 100

Donna is the project manager for her organization. She is preparing a plan to manage changes to the project should changes be requested. Her change management plan defines the process for documenting, tracking, and determining if the changes should be approved or declined. What system is considered the parent of the change control system documented in Donna's plan?

Options:
A.

Project Management Information System

B.

Change Control System

C.

Integrated Change Control System

D.

Quality Management System

Questions 101

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It uses asymmetric key pairs.

B.

It uses symmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It is a digital representation of information that identifies users.

Questions 102

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:
A.

The recipient's public key

B.

Your private key

C.

The recipient's private key

D.

Your public key

Questions 103

Which of the following files must be configured to enable hostname lookups to use the Domain Name Service (DNS)?

Options:
A.

libnss_ldap

B.

/etc/pam.d

C.

/etc/nsswitch.conf

D.

/etc/pam.d/sshd

Questions 104

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

Options:
A.

Project Integration Management

B.

Project Time Management

C.

Project Scope Management

D.

Project Risk Management

Questions 105

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:
A.

Install a host-based IDS

B.

Enable verbose logging on the firewall

C.

Install a DMZ firewall

D.

Install a network-based IDS