Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following programs collects email addresses of users and creates a mailing list?

Options:

A.

Worms


B.

Stealth virus


C.

Boot virus


D.

Spambot


Expert Solution
Questions # 107:

Which of the following can be performed to verify the effectiveness of a quality management system?

Options:

A.

Configuration auditing


B.

Benchmarking


C.

Project analysis


D.

Quality audits


Expert Solution
Questions # 108:

Which of the following is the rating for gasoline or oil fires?

Options:

A.

Class C


B.

Class B


C.

Class D


D.

Class A


Expert Solution
Questions # 109:

During which of the following processes, probability and impact matrix is prepared?

Options:

A.

Perform Quantitative Risk Analysis


B.

Plan Risk Responses


C.

Monitoring and Control Risks


D.

Perform Qualitative Risk Analysis


Expert Solution
Questions # 110:

In which of the following does a project manager assign certain points towards various categories to judge the vendors?

Options:

A.

Project plan


B.

Project analysis


C.

Screening system


D.

Weighting system


Expert Solution
Questions # 111:

Which of the following is a valid space efficiency of RAID 3?

Options:

A.

1 - 1/n


B.

1/n


C.

1 - 2/n


D.

1


Expert Solution
Questions # 112:

What does noise in a power line indicate?

Options:

A.

Power degradation that is low and less than normal


B.

Interference superimposed onto the power line


C.

Momentary high voltage


D.

Prolonged loss of power


Expert Solution
Questions # 113:

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP


B.

TLS


C.

SNMP


D.

SSL


Expert Solution
Questions # 114:

You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.

You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.

What is the most likely cause?

Options:

A.

The group policy is not enabled for the domain.


B.

You failed to add the CA certificate to the trusted root certification authorities container.


C.

Certificate enrollment and renewal is not enabled for the group policy.


D.

An enterprise CA is not online.


Expert Solution
Questions # 115:

Which of the following is a software testing method that uses an internal perspective of the system to design test cases based on the internal structure?

Options:

A.

Water Fall


B.

Black box


C.

White box


D.

Gray box


Expert Solution
Questions # 116:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of four domain controllers, six Windows 2003 member servers, and 500 Windows XP Professional client computers. The PKI infrastructure is already configured on the network. The current configuration of the network allows only managers to use EFS on local computers. Sometimes Mark faces problems when managers lose their private keys due to the user profile becoming corrupt or being lost. Due to this, the files that were persistently encrypted by using the corresponding public key are inaccessible. He wants to restore access to the encrypted files as quickly as possible. What will he do to accomplish the task?

Options:

A.

Ask the managers to log on to the network with a new user account.


B.

Rename all the encrypted files and ask the managers to open the files.


C.

Configure key archival on certificate authority (CA).


D.

Ask the managers to use the Distributed file system (Dfs) to encrypt important files.


Expert Solution
Questions # 117:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

Question # 117

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

I LOVE YOU virus


B.

Nimda virus


C.

Chernobyl virus


D.

Melissa virus


Expert Solution
Questions # 118:

Which wireless security protocol is also known as IEEE 802.11i?

Options:

A.

WPA2


B.

WEP


C.

TKIP


D.

EAP


Expert Solution
Questions # 119:

In Which of the following types of white box testing are the test cases designed based on data flow within the code?

Options:

A.

Data flow testing


B.

Control flow testing


C.

Path testing


D.

Branch testing


Expert Solution
Questions # 120:

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Digest authentication is a more secure authentication method as compared to Basic authentication.


B.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.


C.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.


D.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions