Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 136-150 out of questions
Questions # 136:

Which of the following heights of fence deters only casual trespassers?

Options:

A.

3 to 4 feet


B.

2 to 2.5 feet


C.

8 feet


D.

6 to 7 feet


Expert Solution
Questions # 137:

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Strong encryption


B.

Fiber-optic cable


C.

Firewall


D.

Strong password


Expert Solution
Questions # 138:

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Warm site


B.

Hot site


C.

Off site


D.

Cold site


Expert Solution
Questions # 139:

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network. You want to apply an additional network packet filtering device that is intermediate to your enterprise's internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

Options:

A.

Border network area


B.

Autonomous system area (AS)


C.

Demilitarized zone (DMZ)


D.

Site network area


Expert Solution
Questions # 140:

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company's network. Which of the following encryption types will Linux use?

Options:

A.

CHAP


B.

MSCHAP


C.

RC2


D.

3DES


Expert Solution
Questions # 141:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:

A.

Your public key


B.

The recipient's private key


C.

The recipient's public key


D.

Your private key


Expert Solution
Questions # 142:

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC


B.

MAC


C.

RBAC


D.

DAC


Expert Solution
Questions # 143:

Which of the following features of IE prevent users from a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Pop-up blocker


B.

Cookie


C.

Content Advisor


D.

Phishing Filter


Expert Solution
Questions # 144:

Olive is the program manager for her organization. She has created a request for proposal for a large portion of her program. In this work to be procured she has set several requirements for the vendors to participate. The chief among these requirements is a vendor must have at least four licensed electricians in his team. This requirement for four licensed electricians is an example of which one of the following terms?

Options:

A.

Vendor analysis requirements


B.

Scoring model


C.

Evaluation criteria


D.

Screening system


Expert Solution
Questions # 145:

Which of the following applications would be considered a data warehousing application?

Options:

A.

Golf score tracking


B.

Badge reader


C.

Fraud detection


D.

eCommerce site


Expert Solution
Questions # 146:

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

Options:

A.

18 U.S.C. 2510


B.

18 U.S.C. 1029


C.

18 U.S.C. 1028


D.

18 U.S.C. 1030


Expert Solution
Questions # 147:

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cell Phones


B.

Individual scanners


C.

USB Drives


D.

Individual printers


Expert Solution
Questions # 148:

Which of the following protocols is used as a transport protocol for Internet dial-up connections?

Options:

A.

SMTP


B.

SNMP


C.

DHCP


D.

PPP


Expert Solution
Questions # 149:

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domain-based network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him. Which of the following steps will you take to accomplish the task?

Options:

A.

Remove domain names of such emails from the Safe Sender's list.


B.

Configure phishing filter in Internet Explorer 7.0.

Configure it to filter all phishing mails.


C.

Configure phishing filter in Windows Mail.

Configure it to move such mails to the Junk Mail folder.


D.

Add domain names of such emails in the Block Sender's list.


Expert Solution
Questions # 150:

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses Internet Protocol (IP) for data integrity.


B.

It uses Authentication Header (AH) for data integrity.


C.

It uses Password Authentication Protocol (PAP) for user authentication.


D.

It uses Encapsulating Security Payload (ESP) for data confidentiality.


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 136-150 out of questions