Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

You are a project manager who is completing a project for another organization. The project you are managing will have phased deliverables throughout the project. Stakeholders are required to complete scope validation at the end of each phase so that the project can move forward. Your payment requests will also be attached to the approval of each phase so it is important to you, on several levels, that the stakeholders participate in scope validation as soon as they are requested. You have documented the process for reviewing the product acceptance criteria with the stakeholders.

What project document details the product acceptance criteria in all the projects?

Options:

A.

Statement of Work


B.

Project scope statement


C.

Project management plan


D.

Contract


Expert Solution
Questions # 77:

Which of the following statements are true about an application-level gateway?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It allows client applications to use dynamic ephemeral TCP/UDP ports to communicate with the known ports used by the server applications.


B.

It does not allow customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application protocols.


C.

It is a security component that is added to a firewall or NAT employed in a computer network.


D.

It converts the network layer address information found inside an application payload. The hosts can be on either side of the firewall/NAT.


Expert Solution
Questions # 78:

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.


B.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.


C.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.


D.

He should restore his Windows settings.


Expert Solution
Questions # 79:

You work as a Network Administrator for NetPerfect Inc. You have implemented a firewall on the company's network. You want to ensure that outside users cannot access the internal FTP servers on the network. What will you do to accomplish the task?

Options:

A.

Block the TCP port 443 on the firewall.


B.

Block the UDP port 1701 and TCP port 1723 on the firewall.


C.

Block the TCP port 80 on the firewall.


D.

Block the TCP ports 20 and 21 on the firewall.


Expert Solution
Questions # 80:

You are responsible for network security at a defense contractor. You are very concerned about sensitive data not getting out of your network. You have specific concerns about employees or contractors sending out files via FTP, or even spyware sending out data. You have blocked and monitored ports (as many as you can) on your firewall, and of course, run an anti spyware package.

Which of the following is another step you should take in preventing sensitive data from being sent out of your network without authorization?

Options:

A.

Implement an IDS.


B.

Utilize a DMZ firewall.


C.

Block all employees from emailing outside your network.


D.

Employ network wide anti virus.


Expert Solution
Questions # 81:

Which of the following security protocols can be used to support MS-CHAPv2 for wireless client authentication?

Each correct answer represents a complete solution. Choose two.

Options:

A.

HTTP


B.

PEAP


C.

IPSec


D.

PPTP


Expert Solution
Questions # 82:

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Console


B.

Firewall


C.

Modem


D.

Gateway


E.

Sensor


Expert Solution
Questions # 83:

You are working in a functional organization and are managing the IHH Project. Your project will likely last for six months and has a budget constraint of $1,876,000. You'll be dealing with a functional manager to manage costs and resources in the project. Who will have authority over assigning the project team members to activities?

Options:

A.

Customers


B.

Project sponsor


C.

Functional manager


D.

Team leader


Expert Solution
Questions # 84:

You are the project manager of a large project that will span several time zones. You'll be utilizing project team members from across several departments. Project team members won't be working on the project full-time and will join and leave the project based on assignments in the project schedule.

What project management plan can you create to help you manage when project times will be brought onto and released from the project team?

Options:

A.

Staffing management plan


B.

Team management plan


C.

Project management plan


D.

Human resources management plan


Expert Solution
Questions # 85:

You are the project manager for the GHY Organization. A stakeholder has presented a change to your project that will cause the project scope to increase considerably. You are considering the change for approval and you need to review the impact of the change on all areas of the project. What change control system component is responsible for guiding the review of the impact of all changes on the project management knowledge areas?

Options:

A.

Scope change control system


B.

Change control system


C.

Configuration management


D.

Integrated change control


Expert Solution
Questions # 86:

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

Options:

A.

They can be removed completely by taking proper actions.


B.

They can be analyzed and measured by the risk analysis process.


C.

They are considered an indicator of threats coupled with vulnerability.


D.

They can be mitigated by reviewing and taking responsible actions based on possible risks.


Expert Solution
Questions # 87:

Which of the following is NOT a principle and practice of the 'Minimize the number of highconsequence targets' principle?

Options:

A.

Principle of least privilege


B.

Principle of separation of privileges, duties, and roles


C.

Principle of separation of domains


D.

Principle of trusted entities from untrusted entities


Expert Solution
Questions # 88:

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

Options:

A.

Rainbow attack


B.

SYN flood attack


C.

Zero Day attack


D.

FMS attack


Expert Solution
Questions # 89:

Which of the following is used to detect malicious activity such as port scans or even attempts for cracking into computers by monitoring network traffic?

Options:

A.

IIPS


B.

NIDS


C.

PIDS


D.

HIDS


Expert Solution
Questions # 90:

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Building up an incident response kit


B.

Setting up the initial position after an incident


C.

Working with QA to validate security of the enterprise


D.

Organizing a solution to remove an incident


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions