Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 8

Questions 106

Which of the following uses public key cryptography to encrypt the contents of files?

Options:
A.

NTFS

B.

DFS

C.

RFS

D.

EFS

GIAC GSLC Premium Access
Questions 107

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

Options:
A.

Dsniff

B.

ethereal

C.

Despoof

D.

Neotrace

Questions 108

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Options:
A.

In person attack

B.

Third-party authorization attack

C.

Important user posing attack

D.

Impersonation attack

Questions 109

Which of the following tools can be used to automate the MITM attack?

Options:
A.

Airjack

B.

Kismet

C.

IKECrack

D.

Hotspotter

Questions 110

You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?

Options:
A.

Mitigation

B.

Acceptance

C.

Exploiting

D.

Sharing

Questions 111

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

Options:
A.

Malware protection

B.

Firewall

C.

Automatic updating

D.

Other security settings

Questions 112

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Trojan horse

B.

Worm

C.

Biometrics

D.

Denial-of-Service (DoS)

Questions 113

Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

Options:
A.

Macro

B.

Polymorphic

C.

Logic Bomb

D.

Boot sector

Questions 114

Which of the following is a fake target that deters hackers from locating your real network?

Options:
A.

Malware

B.

Honeypot

C.

KFSensor

D.

Spyware

Questions 115

Which of the following applications would NOT be considered an OLTP application?

Options:
A.

Fraud detection

B.

Badge reader

C.

eCommerce site

D.

Stock-trading site

Questions 116

You are the project manager of the Workstation Improvement Project for your organization. This project will replace 925 workstations with new computers for your company's employees. Mark Jones, the sales manager, has requested that your project add 250 laptops as part of this project as his employees do not have workstations as they travel as part of the sales process. Mark insists that his department in the company can pay for the cost of the laptops. All of the following are components that will be affected by this change request except for which one?

Options:
A.

There will be a need for additional time to install the laptops.

B.

There will be a need for an additional project scope statement because of the change request.

C.

There will be a need for additional procurement management processes.

D.

There will be a need for additional risk analysis for the laptops.

Questions 117

Which of the following are the algorithms contained by the digital signature policy?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Information validation

B.

Signing

C.

Signature verifying

D.

Key Generation

Questions 118

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted; however, you want the least difficulty in the encryption process. Which of the following should you choose?

Options:
A.

DES

B.

MD5

C.

Asymmetric Encryption

D.

Symmetric Encryption

Questions 119

Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric's organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric's organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

Options:
A.

Yes, the ZAS Corporation did not choose to terminate the contract work.

B.

It depends on what the termination clause of the contract stipulates.

C.

It depends on what the outcome of a lawsuit will determine.

D.

No, the ZAS Corporation did not complete all of the work.

Questions 120

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:
A.

Corroborating

B.

Direct

C.

Circumstantial

D.

Incontrovertible