Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Brute force attack


B.

Mail bombing


C.

Dictionary attack


D.

Spoofing


Expert Solution
Questions # 62:

You work as the Network Administrator for a company that does a large amount of defense contract business. A high level of security, particularly regarding sensitive documents, is required. Which of the following are the steps you should take to secure network printers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Remove the printers from the network and do not allow remote printing.


B.

Ensure that the printers hard drive is scanned for spyware.


C.

Secure all remote administrative protocols such as telnet.


D.

Do not allow duplicate print jobs.


E.

Limit the size of print jobs on the printer.


Expert Solution
Questions # 63:

David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

Options:

A.

Striped volume


B.

Spanned volume


C.

RAID-5 volume


D.

Mirrored volume


Expert Solution
Questions # 64:

Which of the following statements are true about WPA?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WPA provides better security than WEP.


B.

Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.


C.

WPA-PSK converts the passphrase into a 256-bit key.


D.

WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.


Expert Solution
Questions # 65:

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email you@gmail.com' and press the submit button. The Web application displays the server error. What can be the reason of the error?

Options:

A.

The remote server is down.


B.

Email entered is not valid.


C.

Your internet connection is slow.


D.

You have entered any special character in email.


Expert Solution
Questions # 66:

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.

File integrity auditing


B.

Reconnaissance


C.

Spoofing


D.

Shoulder surfing


Expert Solution
Questions # 67:

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

mysql_escape_string()


B.

session_regenerate_id()


C.

mysql_real_escape_string()


D.

Prepared statement


Expert Solution
Questions # 68:

Adam works as a Penetration Tester for Umbrella Inc. He is assigned a project of testing the security of the company's network. He is using the Metasploit Framework for developing and executing exploit code against a remote target machine. The Metasploit Framework is the important sub-project of the Metasploit Project. Which of the following are the other sub-projects under the Metasploit projet?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

shellcode archive


B.

Metasploit system


C.

Opcode Database


D.

security research


Expert Solution
Questions # 69:

Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?

Options:

A.

Digital signature


B.

Hash algorithm


C.

Public-key


D.

Quantum


Expert Solution
Questions # 70:

Which of the following is used to allow or deny access to network resources?

Options:

A.

NFS


B.

System hardening


C.

ACL


D.

Spoofing


Expert Solution
Questions # 71:

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Options:

A.

Mandatory Access Control (MAC)


B.

Access control entry (ACE)


C.

Mandatory Integrity Control (MIC)


D.

Security Identifier (SID)


Expert Solution
Questions # 72:

Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPSec


B.

Symmetric


C.

Secret


D.

Asymmetric


Expert Solution
Questions # 73:

Which of the following is responsible for assuring the quality of the deliverables in a project?

Options:

A.

Quality assurance (QA) manager


B.

Quality control (QC) manager


C.

Stakeholder


D.

Project manager


Expert Solution
Questions # 74:

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start


C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup


D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto


Expert Solution
Questions # 75:

A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

Options:

A.

Add the identified risk to the issues log.


B.

Add the identified risk to a quality control management control chart.


C.

Add the identified risk to the low-level risk watchlist.


D.

Add the identified risk to the risk register.


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions