Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following port numbers is used by the LDAP protocol when it is secured?

Options:

A.

335


B.

120


C.

442


D.

636


Expert Solution
Questions # 92:

Which of the following tools can be used to perform polymorphic shell code attacks?

Options:

A.

ADMutate


B.

TrueCrypt


C.

Fragroute


D.

Mendax


Expert Solution
Questions # 93:

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sudden reduction in system resources.


B.

Corrupted or missing files.


C.

Unclear monitor display.


D.

Faster read/write access of the CD-ROM drive.


Expert Solution
Questions # 94:

Which of the following is used to indicate that the project team has decided not to change the project management plan to deal with a risk or is unable to identify any other suitable response strategy?

Options:

A.

Risk avoidance


B.

Risk transference


C.

Risk acceptance


D.

Risk mitigation


Expert Solution
Questions # 95:

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)


B.

Demilitarized zone (DMZ)


C.

Packet filtering


D.

Firewall


Expert Solution
Questions # 96:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.

Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The site should force its users to change their passwords from time to time.


B.

The site should use CAPTCHA after a specific number of failed login attempts.


C.

The site should increase the encryption key length of the password.


D.

The site should restrict the number of login attempts to only three times.


Expert Solution
Questions # 97:

Which type of DNS zone is a read-only copy of the primary DNS zone?

Options:

A.

Secondary DNS zone


B.

Primary DNS zone


C.

Stub DNS zone


D.

SOA DNS zone


Expert Solution
Questions # 98:

Which of the following contains information that is read by a Web application whenever a user visits a site?

Options:

A.

PII


B.

Cookie


C.

Rootkit


D.

DiD


Expert Solution
Questions # 99:

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Database encryption


B.

Symmetric encryption


C.

Asymmetric encryption


D.

XML encryption


Expert Solution
Questions # 100:

Which of the following authentication methods is used to enable a Web browser to provide credentials when making a request during an HTTP transaction?

Options:

A.

Anonymous authentication


B.

Digest authentication


C.

Integrated Windows authentication


D.

Basic authentication


Expert Solution
Questions # 101:

Which of the following is a structured review of the procurement process originated at the Plan Procurements process?

Options:

A.

Procurement document package


B.

Administer Procurements process


C.

Procurement auditing


D.

Project Procurement Management


Expert Solution
Questions # 102:

John works as a network security officer in Gentech Inc. The company uses a TCP/IP network. While working on the network, a problem occurs related to the DNS resolution. Which of the following utilities can he use to diagnose the problem?

Options:

A.

IPConfig


B.

Ping


C.

Tracert


D.

nslookup


Expert Solution
Questions # 103:

Which of the following RAID levels is supported by an operating system?

Options:

A.

RAID 4


B.

RAID 6


C.

RAID 0


D.

RAID 3


Expert Solution
Questions # 104:

Which of the following standards is also known as IEEE 802.11i?

Options:

A.

Wi-Fi Protected Access 2 (WPA2)


B.

Wi-Fi Protected Access (WPA)


C.

Wired Equivalent Privacy (WEP)


D.

Wireless Access Protocol (WAP)


Expert Solution
Questions # 105:

Which of the following is a cryptographic approach employed by many cryptographic algorithms and cryptosystems?

Options:

A.

Symmetric-key cryptography


B.

Public-key cryptography


C.

Asymmetric-key cryptography


D.

Quantum cryptography


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions