Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Roberta is the project manager of the KJL Project for her company. She is creating a chart that will help categorize the problems discovered during the quality control inspection process. She wants to create a chart where she can categorize the number of instances of problems and rank the problems based on frequency. Which chart should Roberta create?

Options:

A.

Pareto Chart


B.

Scatter diagram


C.

Fishbone diagram


D.

Control chart


Questions # 2:

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses asymmetric key pairs.


B.

It uses symmetric key pairs.


C.

It provides security using data encryption and digital signature.


D.

It is a digital representation of information that identifies users.


Questions # 3:

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Cookie poisoning


B.

Cross site scripting


C.

Man-in-the-middle attack


D.

Computer-based social engineering


Questions # 4:

Donna is the project manager for her organization. She is preparing a plan to manage changes to the project should changes be requested. Her change management plan defines the process for documenting, tracking, and determining if the changes should be approved or declined. What system is considered the parent of the change control system documented in Donna's plan?

Options:

A.

Project Management Information System


B.

Change Control System


C.

Integrated Change Control System


D.

Quality Management System


Questions # 5:

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)


B.

Firewall


C.

Demilitarized zone (DMZ)


D.

Packet filtering


Questions # 6:

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Using personal firewall software on your Laptop.


B.

Using an IPSec enabled VPN for remote connectivity.


C.

Using portscanner like nmap in your network.


D.

Using a protocol analyzer on your Laptop to monitor for risks.


Questions # 7:

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

• Network diagrams of the we-are-secure infrastructure

• Source code of the security tools

• IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:

A.

Blackbox


B.

Alpha testing


C.

Whitebox


D.

Graybox


Questions # 8:

Which of the following processes is described in the statement below?

"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Options:

A.

Identify Risks


B.

Perform Quantitative Risk Analysis


C.

Perform Qualitative Risk Analysis


D.

Monitor and Control Risks


Questions # 9:

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WEP


B.

WPA-PSK


C.

WPA2 -EAP


D.

WPA-EAP


Questions # 10:

Which of the following sections come under the ISO/IEC 27002 standard?

Options:

A.

Financial assessment


B.

Security policy


C.

Risk assessment


D.

Asset management


Questions # 11:

Which of the following are the benefits of information classification for an organization?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.


B.

It ensures that modifications are not made to data by unauthorized personnel or processes.


C.

It helps reduce the Total Cost of Ownership (TCO).


D.

It helps identify which protections apply to which information.


Questions # 12:

You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?

Options:

A.

Trace back that traffic and find its origin.


B.

Check the exceptions in the firewall and unselect that port exception.


C.

Perform a virus scan to find the virus responsible for this traffic.


D.

Shut down the service that connects to that port.


Questions # 13:

Managerial wisdom is the combination of knowledge as well as experience. It is the ability of the leaders to understand the members of the team. Which of the following are the characteristics that come under managerial wisdom?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dominating


B.

Simple


C.

Values


D.

Listener


Questions # 14:

In which of the following malicious hacking steps does email tracking come under?

Options:

A.

Maintaining Access


B.

Gaining access


C.

Reconnaissance


D.

Scanning


Questions # 15:

Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources and information?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Training and awareness


B.

Employee registration and accounting


C.

Network authentication


D.

Encryption


E.

Disaster preparedness and recovery plans


Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions