Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret


B.

Synchronous


C.

Asymmetric


D.

Symmetric


Expert Solution
Questions # 122:

Which of the following uses a variable-length Initialization Vector (IV), where the encrypted data begins?

Options:

A.

DES-OFB


B.

DES-ECB


C.

DES-CBC


D.

DES-CFB


Expert Solution
Questions # 123:

An IPS sensor triggers an alarm known as "signature firing". What events may occur in response?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Attacker's IP address is blocked


B.

Unauthorized packets are dropped


C.

A log entry is Created


D.

TCP connection is reset


Expert Solution
Questions # 124:

Which of the following blocks unwanted advertisements and small windows that pop up suddenly in IE, without user's initiation?

Options:

A.

Phishing filter


B.

Pop-up blocker


C.

Content Advisor


D.

Cookies


Expert Solution
Questions # 125:

Which function of incident handling involves in-depth investigation of the incident report or incident activity to establish the priority and threat of the incident?

Options:

A.

Incident analysis


B.

Incident reporting


C.

Incident response


D.

Incident identification


Expert Solution
Questions # 126:

Which of the following honeypots captures limited amounts of information, mainly transactional data and some limited interaction?

Options:

A.

Low-interaction


B.

High-interaction


C.

Network


D.

Medium-interaction


Expert Solution
Questions # 127:

Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?

Options:

A.

Zero-day


B.

IP spoofing


C.

Brute force


D.

FMS


Expert Solution
Questions # 128:

In which technique are phases overlapped that would normally be done in sequence?

Options:

A.

Critical path


B.

Lead time


C.

Fast tracking


D.

Project tracking


Expert Solution
Questions # 129:

Fill in the blank with the appropriate type of router.

A _________ router performs packet-filtering and is used as a firewall.


Expert Solution
Questions # 130:

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4


B.

IEEE 802.3


C.

IEEE 802.11b


D.

IEEE 802.5


Expert Solution
Questions # 131:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Steg-Only Attack


B.

Stegdetect Attack


C.

Active Attacks


D.

Chosen-Stego Attack


Expert Solution
Questions # 132:

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:

HTTP

SSL

SSH

IPSec

Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSH


B.

SSL


C.

HTTP


D.

IPSec


Expert Solution
Questions # 133:

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server. Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Policy-based detection


B.

Signature-based detection


C.

Anamoly-based detection


D.

Honey pot detection


Expert Solution
Questions # 134:

Fill in the blank with the appropriate tool name.

________ is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.


Expert Solution
Questions # 135:

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and two subordinate CAs. The root CA will be used to issue certificates to the subordinate CAs, and the subordinate CAs will be used to issue certificates to the clients. The security policy of the company dictates that the security of high-level CAs should not be compromised. Which of the following steps will you take to implement the security policy of the company?

Options:

A.

Take the root enterprise CA offline after it issues certificates to its subordinate CAs.


B.

Place all CA servers in a locked room.


C.

Take subordinate CAs offline after they get their certificates from the root CA.


D.

Configure a firewall on the network.


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions