Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

Question # 16

The e-mail that John has received is an example of __________.

Options:

A.

Social engineering attacks


B.

Virus hoaxes


C.

Spambots


D.

Chain letters


Expert Solution
Questions # 17:

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted; however, you want the least difficulty in the encryption process. Which of the following should you choose?

Options:

A.

DES


B.

MD5


C.

Asymmetric Encryption


D.

Symmetric Encryption


Expert Solution
Questions # 18:

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Stealth


B.

Multipartite


C.

Boot sector


D.

File


Expert Solution
Questions # 19:

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Identification


B.

Configuration Item Costing


C.

Configuration Status Accounting


D.

Configuration Verification and Auditing


Expert Solution
Questions # 20:

You are trying to select a particular wireless encryption algorithm. You are concerned that it implements as much of the wireless 802.11i standard as possible. Which encryption algorithm should you implement?

Options:

A.

WEP


B.

WPA


C.

WEP2


D.

WPA2


Expert Solution
Questions # 21:

Which of the following techniques is based on a set of criteria that has been acquired in a specific knowledge area or product area?

Options:

A.

Expert judgment


B.

Program Evaluation Review Technique (PERT) chart


C.

Function Point Analysis (FP Analysis)


D.

Delphi technique


Expert Solution
Questions # 22:

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Cryptanalysis


B.

Spoofing


C.

Packet sniffing


D.

Steganography


Expert Solution
Questions # 23:

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address 210.213.23.21. This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

Options:

A.

24171811


B.

24171311


C.

24619311


D.

24171111


Expert Solution
Questions # 24:

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

Options:

A.

ARP spoofing


B.

Replay attack


C.

Rainbow attack


D.

DoS attack


Expert Solution
Questions # 25:

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Off-channel verification.


B.

Using Secret keys for authentication.


C.

Using basic authentication.


D.

Using public key infrastructure authentication.


Expert Solution
Questions # 26:

Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?

Options:

A.

Project Cost Management


B.

Project Integration Management


C.

Project Time Management


D.

Project Scope Management


E.

Project Quality Management


Expert Solution
Questions # 27:

Which of the following tools is used to hide secret data in text files and is based on the concept that spaces and tabs are generally not visible in text viewers and therefore a message can be effectively hidden without affecting the text's visual representation for the casual observer?

Options:

A.

SARA


B.

Snow.exe


C.

Fpipe


D.

Image hide


Expert Solution
Questions # 28:

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering


B.

Smurf DoS


C.

Brute force


D.

Ping flood attack


Expert Solution
Questions # 29:

You are a project manager for a recycling company. You are in the process of reviewing proposals from sellers for recycling equipment. You notice the scope statement states the company required to abide by the environmental agencies regulations regarding waste. As a result, you select proposals that automatically include features such as scrubbers and baghouses to reduce hazardous waste. Which of the following is true regarding the scope statement?

Options:

A.

It includes an introductory schedule management plan.


B.

Knowing the limits and the projects required helps determine the resources to purchase.


C.

It is a deliverable-oriented collection of project components.


D.

It is the methods and procedures an organization must follow to create the activity list.


Expert Solution
Questions # 30:

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

Options:

A.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)


B.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)


C.

Asset Value X Exposure Factor (EF)


D.

Exposure Factor (EF)/Single Loss Expectancy (SLE)


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions