Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSLC Practice Exam with Questions & Answers | Set: 9

Questions 121

Which of the following is used to translate domain names into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide?

Options:
A.

DFSR

B.

DNS

C.

DFS

D.

EFS

GIAC GSLC Premium Access
Questions 122

John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?

Options:
A.

18 U.S.C. 1362

B.

18 U.S.C. 2701

C.

18 U.S.C. 1030

D.

18 U.S.C. 2510

Questions 123

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GSLC Question 123

Which of the following tools is John using to crack the wireless encryption keys?

Options:
A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Questions 124

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:
A.

Active IDS

B.

Passive IDS

C.

Network-based IDS

D.

Signature-based IDS

Questions 125

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

Options:
A.

Cost

B.

Schedule

C.

Contract

D.

Resources

Questions 126

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

• What ports are open on our network systems

• What hosts are available on the network

• Identify unauthorized wireless access points

• What services (application name and version) those hosts are offering

• What operating systems (and OS versions) they are running

• What type of packet filters/firewalls are in use

Which of the following tools is Victor using?

Options:
A.

Nmap

B.

Sniffer

C.

Kismet

D.

Nessus

Questions 127

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

Options:
A.

John the Ripper

B.

Cheops-ng

C.

AiroPeek

D.

Sam Spade

Questions 128

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:
A.

Quantitative risk analysis

B.

Seven risk responses

C.

Qualitative risk analysis

D.

A risk probability-impact matrix

Questions 129

Which of the following attacks is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker?

Options:
A.

Adaptive chosen-ciphertext

B.

Chosen-ciphertext

C.

Chosen-plain-supermodel

D.

Related-key

Questions 130

Which of the following attacks does Management Frame Protection help to mitigate?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Replay attack

B.

DoS attack

C.

DDoS attack

D.

Man-in-the-middle attack

Questions 131

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:
A.

Code red

B.

Beast

C.

SQL Slammer

D.

Klez

Questions 132

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:
A.

Stealth virus

B.

Multipartite virus

C.

File virus

D.

Polymorphic virus

E.

Boot sector virus

Questions 133

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

Options:
A.

Fixed Price with Economic Price Adjustment

B.

Fixed Price Incentive Fee

C.

Cost Plus Fixed Fee Contract

D.

Firm Fixed Price

Questions 134

Which of the following tasks can be performed by a malicious bot/botnet?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Harvesting email addresses from contact forms or guestbook pages.

B.

Performing a spoofing attack.

C.

Downloading entire Web site to suck the bandwidth of a target.

D.

Stealing various information like credit card numbers, login, ids, etc.

E.

Performing DDoS attacks.

Questions 135

Which of the following security protocols can be used to support MS-CHAPv2 for wireless client authentication?

Each correct answer represents a complete solution. Choose two.

Options:
A.

HTTP

B.

PEAP

C.

IPSec

D.

PPTP