Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions
Questions # 151:

Which of the following is used to communicate with an authentication server commonly used in UNIX networks?

Options:

A.

MS-CHAP


B.

IPX/SPX


C.

SMTP


D.

TACACS


Expert Solution
Questions # 152:

Fill in the blank with the appropriate word.

________ is also used to refer to any attempt to circumvent the security of other types of cryptographic algorithms and protocols in general, and not just encryption.


Expert Solution
Questions # 153:

Which of the following relies on a physical characteristic of the user to verify his identity?

Options:

A.

Kerberos v5


B.

Social Engineering


C.

CHAP


D.

Biometrics


Expert Solution
Questions # 154:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Eavesdropping


B.

Fingerprinting


C.

Web ripping


D.

TCP FTP proxy scanning


Expert Solution
Questions # 155:

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domainbased network. The network contains five Windows 2003 member servers and 300 Windows XP Professional client computers. Mark is setting up a wireless network for the company. He is planning to implement 802.1x authentication for this new wireless network. Mark is not planning to use a public key infrastructure (PKI) and certificates for authentication. Mark also wants an encrypted authentication channel and a fast reconnect using cached session keys. Which of the following authentication methods will he use to accomplish the task?

Options:

A.

Protected EAP (PEAP)


B.

EAP-Transport Layer Security (EAP-TLS)


C.

Shared Key authentication


D.

Digest authentication


Expert Solution
Questions # 156:

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Stick


B.

ADMutate


C.

Absinthe


D.

Fragroute


Expert Solution
Questions # 157:

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Configure the authentication type for the wireless LAN to Open system.


B.

Install a firewall software on each wireless access point.


C.

Configure the authentication type for the wireless LAN to Shared Key.


D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.


E.

Broadcast SSID to connect to the access point (AP).


F.

On each client computer, add the SSID for the wireless LAN as the preferred network.


Expert Solution
Questions # 158:

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you'll first need to understand all of the following except for which one?

Options:

A.

Summary milestone for the likely project phases


B.

Measurable project objectives and related success criteria


C.

Summary budget


D.

Quality improvement program your company uses


Expert Solution
Questions # 159:

You work as Network and Security Manager for PassGuide Inc. The management of the company is quite concerned about the security of the network. The management has assigned this task to you to improve the security. Which of the following access methods will you use if the method is to be primarily based on pre-established access, and users cannot change it?

Options:

A.

PAC


B.

OrBAC


C.

MAC


D.

RBAC


Expert Solution
Questions # 160:

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

Options:

A.

Armored virus


B.

Stealth virus


C.

Multipartite virus


D.

Polymorphic virus


Expert Solution
Questions # 161:

Fill in the blank with the appropriate word.

A_______ is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems.


Expert Solution
Questions # 162:

Which of the following types of cryptography algorithms is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation?

Options:

A.

RC2


B.

Stream cipher


C.

Block cipher


D.

Triple DES


Expert Solution
Questions # 163:

Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals:

No external traffic should be allowed into the network.

Administrators should be able to restrict the websites which can be accessed by the internal users.

Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Internet Connection Sharing (ICS)


B.

Network Address Translator (NAT)


C.

Firewall


D.

Proxy Server


E.

Routing and Remote Access Service (RRAS)


Expert Solution
Questions # 164:

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

Options:

A.

JPlag


B.

BackTrack


C.

Vedit


D.

Ettercap


Expert Solution
Questions # 165:

You are a Network Administrator in an enterprise. You have been assigned the task of installing Windows 2000 and some other applications, on each computer on the network. But in the enterprise environment, it is not cost effective to install Windows 2000 and other applications, using the standard interactive setup on each computer. You plan to perform automated installation on multiple computers. Which of the following installation tasks can be automated?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Service Packs for Windows 2000 Server.


B.

Any application that does not run as a service.


C.

Additional language support for Windows 2000 Server, through the installation of various language packs.


D.

Any application that runs as a service.


E.

The core operating system of Windows 2000 Server.


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions