Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions
Questions # 31:

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated.

In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections.

Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

Options:

A.

The laptop users will be able to use smart cards for getting authenticated.


B.

None of the tasks will be accomplished.


C.

Both tasks will be accomplished.


D.

The wireless network communication will be secured.


Expert Solution
Questions # 32:

Internet Protocol Security (IPSec) provides data protection during network communication. Which of the following tasks can be performed by IPSec?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ensures the integrity of the IP data.


B.

Authenticates the sender of IP data.


C.

Encrypts all data for full confidentiality.


D.

Displays the originating IP addresses.


Expert Solution
Questions # 33:

Which of the following is used to translate domain names into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide?

Options:

A.

DFSR


B.

DNS


C.

DFS


D.

EFS


Expert Solution
Questions # 34:

You work as a Network Administrator for Net Perfect Inc. The company's intranet Web site netperfect.com uses a digital certificate issued by the company's Enterprise Certificate Authority. The Enterprise Certificate Authority is located on a server named certificates.netperfect.com. Kate, a user, complains that she is unable to access the secure Web site on her computer using Internet Explorer. An error message appears stating that the digital certificate is not from a trusted source. What is the most likely cause?

Options:

A.

Kate's computer is not configured with the digital certificate.


B.

The company's intranet server is not configured to support remote connections.


C.

Kate is not a member of the Administrators group.


D.

Kate is not using https protocol to connect to the secure Web site.


Expert Solution
Questions # 35:

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

Options:

A.

Macro virus


B.

Stealth virus


C.

E-mail virus


D.

Polymorphic virus


Expert Solution
Questions # 36:

Which of the following is a fake target that deters hackers from locating your real network?

Options:

A.

Malware


B.

Honeypot


C.

KFSensor


D.

Spyware


Expert Solution
Questions # 37:

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card?

Each correct answer represents a complete solution. Choose two.

Options:

A.

These tools can determine the authorization status of an access point.


B.

These tools cannot detect rogue access points if the victim is using data encryption.


C.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.


D.

These tools can determine the rogue access point even when it is attached to a wired network.


Expert Solution
Questions # 38:

Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric's organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric's organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

Options:

A.

Yes, the ZAS Corporation did not choose to terminate the contract work.


B.

It depends on what the termination clause of the contract stipulates.


C.

It depends on what the outcome of a lawsuit will determine.


D.

No, the ZAS Corporation did not complete all of the work.


Expert Solution
Questions # 39:

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Options:

A.

In person attack


B.

Third-party authorization attack


C.

Important user posing attack


D.

Impersonation attack


Expert Solution
Questions # 40:

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.


B.

Black box testing simulates an attack from someone who is familiar with the system.


C.

Black box testing simulates an attack from someone who is unfamiliar with the system.


D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.


Expert Solution
Questions # 41:

It is the technique for gathering information for a Web site owner about a user through a few lines of code that reside in the Web pages. This information is gathered through __________.

Options:

A.

Spambot


B.

Spyware


C.

Web Bugs


D.

Bogus spyware removal programs


Expert Solution
Questions # 42:

Which of the following work as traffic monitoring tools in the Linux operating system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPTraf


B.

Hotspotter


C.

Ntop


D.

John the Ripper


Expert Solution
Questions # 43:

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms can exist inside files such as Word or Excel documents.


B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.


C.

Worms replicate themselves from one system to another without using a host file.


D.

One feature of worms is keystroke logging.


Expert Solution
Questions # 44:

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

Options:

A.

Public-key cryptography


B.

Steganography


C.

RSA algorithm


D.

Encryption


Expert Solution
Questions # 45:

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk transfer


B.

Risk acceptance


C.

Risk avoidance


D.

Risk mitigation


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions