Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

GIAC Security Leadership Certification (GSLC) Question and Answers

GIAC Security Leadership Certification (GSLC)

Last Update May 18, 2024
Total Questions : 567

We are offering FREE GSLC GIAC exam questions. All you do is to just go and sign up. Give your details, prepare GSLC free exam questions and then go for complete pool of GIAC Security Leadership Certification (GSLC) test questions that will help you more.

GSLC pdf

GSLC PDF

$35  $99.99
GSLC Engine

GSLC Testing Engine

$42  $119.99
GSLC PDF + Engine

GSLC PDF + Testing Engine

$56  $159.99
Questions 1

The Project Procurement Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Contract Administration

B.  

Team Development

C.  

Staff Acquisition

D.  

Contract Closure

Discussion 0
Questions 2

Which of the following protocols is used as a transport protocol for Internet dial-up connections?

Options:

A.  

SMTP

B.  

SNMP

C.  

DHCP

D.  

PPP

Discussion 0
Questions 3

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.  

MIC

B.  

MAC

C.  

RBAC

D.  

DAC

Discussion 0
Questions 4

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

Options:

A.  

JPlag

B.  

BackTrack

C.  

Vedit

D.  

Ettercap

Discussion 0
Questions 5

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

Options:

A.  

STP

B.  

UDP

C.  

TCP

D.  

SNMP

Discussion 0
Questions 6

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.  

ICMP

B.  

SCP protocol

C.  

Rootkit

D.  

Packet sniffing

Discussion 0
Questions 7

Which of the following terms refers to a prolonged loss of power?

Options:

A.  

Spike

B.  

Brownout

C.  

Surge

D.  

Blackout

Discussion 0
Questions 8

Which of the following contains information that is read by a Web application whenever a user visits a site?

Options:

A.  

PII

B.  

Cookie

C.  

Rootkit

D.  

DiD

Discussion 0
Questions 9

Which networking protocol is used to authenticate users or devices before granting them access to a network?

Options:

A.  

IPSec

B.  

PAgP

C.  

RADIUS

D.  

SRP

Discussion 0
Questions 10

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

DES

B.  

Blowfish

C.  

IDEA

D.  

RC4

Discussion 0
Questions 11

Which field is NOT defined while creating rules for the Network Honeypot rulebase?

Options:

A.  

Response options

B.  

Process mode

C.  

Operation mode

D.  

Notification options

Discussion 0
Questions 12

You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.

You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.

What is the most likely cause?

Options:

A.  

The group policy is not enabled for the domain.

B.  

You failed to add the CA certificate to the trusted root certification authorities container.

C.  

Certificate enrollment and renewal is not enabled for the group policy.

D.  

An enterprise CA is not online.

Discussion 0
Questions 13

Which of the following are vulnerable to social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Minimal trained company employees

B.  

Encrypted data on the hard disk drive

C.  

A public building that has shared office space

D.  

An office with a biometrics authentication system

Discussion 0
Questions 14

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:

• HTTP

• SSL

• SSH

• IPSec

Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

SSH

B.  

IPSec

C.  

HTTP

D.  

SSL

Discussion 0
Questions 15

Which of the following is a structured review of the procurement process originated at the Plan Procurements process?

Options:

A.  

Procurement document package

B.  

Administer Procurements process

C.  

Procurement auditing

D.  

Project Procurement Management

Discussion 0
Questions 16

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Console

B.  

Firewall

C.  

Modem

D.  

Gateway

E.  

Sensor

Discussion 0
Questions 17

Holly is the project manager of the GHQ Project for her organization. The project is using the AAA IT Integrators Corporation as a vendor to do a portion of the project work. Mitch Smith, the IT Directors for the AAA IT Integrators Corporation, reports that his team has completed the project work. Holly and her team review the deliverables and she confirms that Mitch's team has indeed completed the work according to the statement of work. What document should Holly refer to now to determine the next course of action with the AAA IT Integrators Corporation?

Options:

A.  

Procurement management plan

B.  

Statement of Work

C.  

Contract

D.  

Project management plan

Discussion 0
Questions 18

You are the project manager of a large project that will span several time zones. You'll be utilizing project team members from across several departments. Project team members won't be working on the project full-time and will join and leave the project based on assignments in the project schedule.

What project management plan can you create to help you manage when project times will be brought onto and released from the project team?

Options:

A.  

Staffing management plan

B.  

Team management plan

C.  

Project management plan

D.  

Human resources management plan

Discussion 0
Questions 19

Which key of the Asymmetric encryption is used to encrypt the data when a user sends a message or data to another user?

Options:

A.  

Symmetric

B.  

Private

C.  

Public

D.  

Asymmetric

Discussion 0
Questions 20

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.  

Examining your firewall logs

B.  

Examining your antivirus logs

C.  

Examining your domain controller server logs

D.  

Examining your DNS Server logs

Discussion 0
Questions 21

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:

A.  

Social engineering

B.  

Smurf

C.  

Denial-of-Service

D.  

Man-in-the-middle

Discussion 0
Questions 22

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.  

File-based

B.  

Anomaly-based

C.  

Signature-based

D.  

Network-based

Discussion 0
Questions 23

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.  

Contamination

B.  

Eradication

C.  

Recovery

D.  

Identification

E.  

Preparation

Discussion 0
Questions 24

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Options:

A.  

Mandatory Access Control (MAC)

B.  

Access control entry (ACE)

C.  

Mandatory Integrity Control (MIC)

D.  

Security Identifier (SID)

Discussion 0
Questions 25

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

Options:

A.  

Snadboy's Revelation

B.  

Kismet

C.  

NetStumbler

D.  

WEPCrack

Discussion 0
Questions 26

Which of the following protocols provides mail forwarding and information storing features?

Options:

A.  

IMAP

B.  

SMTP

C.  

SNMP

D.  

POP

Discussion 0
Questions 27

A management workstation collects and connects events from multiple IPS sensors in the network.

Which protocol is used in this process?

Options:

A.  

SNMP

B.  

SCCP

C.  

SRTP

D.  

SDEE

Discussion 0
Questions 28

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of two Windows 2003 member servers and 500 Windows XP Professional client computers. The member servers are working as file servers. All the member servers are located in an OU named MEMSERV. Mark wants to test IPSec interoperability on the network. For this purpose, he creates a GPO named EXP. In the EXP GPO, he creates an IPSec policy named IPTEST. The IPTEST policy contains a rule that specifies the use of Encapsulating Security Payload (ESP) with null encryption. The IPTEST policy is applied to the member servers by linking the EXP GPO to the MEMSERV OU. After testing the IPSec interoperability, Mark wants to ensure that the member servers no longer use the IPTEST policy. What will he do to accomplish the task?

Options:

A.  

Run the REMOVEPOL command on all the member servers.

B.  

Unassign the IPTEST policy in the EXP Group Policy object.

C.  

Delete the IPTEST policy in the EXP Group Policy object.

D.  

Reset the IPTEST policy in the EXP Group Policy object.

Discussion 0
Questions 29

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

The attacker must determine the right values for all the form inputs.

B.  

The attacker must target a site that doesn't check the referrer header.

C.  

The target site should have limited lifetime authentication cookies.

D.  

The target site should authenticate in GET and POST parameters, not only cookies.

Discussion 0
Questions 30

Which firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network?

Options:

A.  

Deep packet inspection

B.  

Packet hosting

C.  

Screened host

D.  

Packet filtering

Discussion 0
Questions 31

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

Options:

A.  

Rainbow attack

B.  

SYN flood attack

C.  

Zero Day attack

D.  

FMS attack

Discussion 0
Questions 32

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Using either WEP or WPA encryption

B.  

Hardening the server OS

C.  

MAC filtering on the router

D.  

Not broadcasting SSID

E.  

Strong password policies on workstations.

Discussion 0
Questions 33

All of the following are the password cracking attacks performed by the cain tool except for which one?

Options:

A.  

Brute force attack

B.  

Dictionary attack

C.  

DoS attack

D.  

Rainbow attack

Discussion 0
Questions 34

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.  

Reconnaissance

B.  

File integrity auditing

C.  

Shoulder surfing

D.  

Spoofing

Discussion 0
Questions 35

What do spikes in a power line indicate?

Options:

A.  

Interference superimposed onto the power line

B.  

Momentary high voltage

C.  

Prolonged loss of power

D.  

Momentary low voltage

Discussion 0
Questions 36

Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?

Options:

A.  

NMap

B.  

Domain tasting

C.  

Proxy server

D.  

PsPasswd

Discussion 0
Questions 37

Which of the following is a software testing method that uses an internal perspective of the system to design test cases based on the internal structure?

Options:

A.  

Water Fall

B.  

Black box

C.  

White box

D.  

Gray box

Discussion 0
Questions 38

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

Options:

A.  

I LOVE YOU

B.  

Melissa

C.  

Klez

D.  

Boot sector

Discussion 0
Questions 39

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Digest authentication is a more secure authentication method as compared to Basic authentication.

B.  

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

C.  

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D.  

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

Discussion 0
Questions 40

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.  

WPA with 802.1X authentication

B.  

WPA with Pre Shared Key

C.  

WEP

D.  

WPA

Discussion 0
Questions 41

You are responsible for the security computers in college labs. Since a number of students have significant computer skills, you wish to make security impossible to breach through normal operating system based means. Furthermore, you want to have the security require a password that must be entered before the operating system even loads. What will you do to accomplish the task?

Options:

A.  

Implement biometric security.

B.  

Implement bios security that prevents the system from loading if the correct password is not entered.

C.  

Implement an operating system password that prevents the system from loading if the correct password is not entered.

D.  

Implement hard drive encryption with a password tied into the operating system password.

Discussion 0
Questions 42

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Options:

A.  

PDA Hijacking

B.  

Session Hijacking

C.  

Privilege Escalation

D.  

Bluesnarfing

Discussion 0
Questions 43

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.  

Single Loss Expectancy (SLE)

B.  

Exposure Factor (EF)

C.  

Annualized Rate of Occurrence (ARO)

D.  

Safeguard

Discussion 0
Questions 44

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.  

Impersonation attack

B.  

In person attack

C.  

Important user posing attack

D.  

Reverse social engineering attack

Discussion 0
Questions 45

Which of the following statements are true about an application-level gateway?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It allows client applications to use dynamic ephemeral TCP/UDP ports to communicate with the known ports used by the server applications.

B.  

It does not allow customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application protocols.

C.  

It is a security component that is added to a firewall or NAT employed in a computer network.

D.  

It converts the network layer address information found inside an application payload. The hosts can be on either side of the firewall/NAT.

Discussion 0
Questions 46

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

Options:

A.  

Black-box testing

B.  

White-box testing

C.  

Unit testing

D.  

Gray-box testing

Discussion 0
Questions 47

You are a project manager who is completing a project for another organization. The project you are managing will have phased deliverables throughout the project. Stakeholders are required to complete scope validation at the end of each phase so that the project can move forward. Your payment requests will also be attached to the approval of each phase so it is important to you, on several levels, that the stakeholders participate in scope validation as soon as they are requested. You have documented the process for reviewing the product acceptance criteria with the stakeholders.

What project document details the product acceptance criteria in all the projects?

Options:

A.  

Statement of Work

B.  

Project scope statement

C.  

Project management plan

D.  

Contract

Discussion 0
Questions 48

Which of the following processes is described in the statement below?

"This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.  

Identify Risks

B.  

Perform Quantitative Risk Analysis

C.  

Monitor and Control Risks

D.  

Perform Qualitative Risk Analysis

Discussion 0
Questions 49

John works as a Website Administrator in ABC Inc. The company has to set a privacy policy on all the computers. The policy requires John to restrict only third party cookies that do not have a compact private policy or that use personally identifiable information without a user's implicit consent. He reports to the Technical Support Executive that he wants to set the policy. The Technical Support Executive asks him to configure the settings in the Privacy tab page. Which of the following privacy settings will John use to accomplish the task?

Options:

A.  

High

B.  

Low

C.  

Block All Cookies

D.  

The policy cannot be set.

Discussion 0
Questions 50

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.  

Backup

B.  

Symmetric encryption

C.  

Firewall

D.  

Antivirus

Discussion 0
Questions 51

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.  

The distortion technique

B.  

The substitution technique

C.  

The cover generation technique

D.  

The spread spectrum technique

Discussion 0
Questions 52

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.  

Acceptance

B.  

Transference

C.  

Mitigation

D.  

Avoidance

Discussion 0
Questions 53

Which of the following processes is NOT a part of the Project Procurement Management Knowledge Area?

Options:

A.  

Develop Project Management Plan

B.  

Request Seller Responses

C.  

Contract Administration

D.  

Plan Purchases and Acquisitions

Discussion 0
Questions 54

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Cell Phones

B.  

Individual scanners

C.  

USB Drives

D.  

Individual printers

Discussion 0
Questions 55

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

WEP uses the RC4 encryption algorithm.

B.  

Automated tools such as AirSnort are available for discovering WEP keys.

C.  

It provides better security than the Wi-Fi Protected Access protocol.

D.  

The Initialization Vector (IV) field of WEP is only 24 bits long.

Discussion 0
Questions 56

Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?

Options:

A.  

PERT

B.  

CPM

C.  

FP

D.  

Gantt

Discussion 0
Questions 57

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.  

Spoofing

B.  

Phishing

C.  

Password guessing attack

D.  

Replay attack

Discussion 0
Questions 58

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.  

Eavesdropping

B.  

Fingerprinting

C.  

Web ripping

D.  

TCP FTP proxy scanning

Discussion 0
Questions 59

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Security policy

B.  

Auditing

C.  

Security awareness training

D.  

Data Backup

Discussion 0
Questions 60

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.  

ESP is always used in combination with Authentication Header (AH).

B.  

ESP can encrypt data and verify data integrity.

C.  

ESP is never used in combination with Authentication Header (AH).

D.  

ESP only verifies data integrity.

Discussion 0
Questions 61

Which of the following PPP configuration options is used to increase the effective throughput on PPP connections by reducing the amount of data in the frame that must travel across the link?

Options:

A.  

Authentication

B.  

Error detection

C.  

Compression

D.  

Multilink

Discussion 0
Questions 62

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.  

IEEE 802.4

B.  

IEEE 802.3

C.  

IEEE 802.11b

D.  

IEEE 802.5

Discussion 0
Questions 63

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domainbased network. The network contains five Windows 2003 member servers and 300 Windows XP Professional client computers. Mark is setting up a wireless network for the company. He is planning to implement 802.1x authentication for this new wireless network. Mark is not planning to use a public key infrastructure (PKI) and certificates for authentication. Mark also wants an encrypted authentication channel and a fast reconnect using cached session keys. Which of the following authentication methods will he use to accomplish the task?

Options:

A.  

Protected EAP (PEAP)

B.  

EAP-Transport Layer Security (EAP-TLS)

C.  

Shared Key authentication

D.  

Digest authentication

Discussion 0
Questions 64

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.  

Steg-Only Attack

B.  

Stegdetect Attack

C.  

Active Attacks

D.  

Chosen-Stego Attack

Discussion 0
Questions 65

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.  

Qualitative analysis

B.  

Quantitative analysis

C.  

Risk identification

D.  

Estimate activity duration

Discussion 0
Questions 66

Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?

Options:

A.  

WEP

B.  

WAP

C.  

L2TP

D.  

IPSec

Discussion 0
Questions 67

Which of the following tools can be used to automate the MITM attack?

Options:

A.  

Airjack

B.  

Kismet

C.  

IKECrack

D.  

Hotspotter

Discussion 0
Questions 68

Mark works as a Network Administrator for Technet Inc. The company has a Windows 2003 domainbased network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the RAID-5 volume?

Options:

A.  

Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.

B.  

Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

C.  

Use Disk Management, select the failed drive, and then regenerate the volume.

D.  

Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.

Discussion 0
Questions 69

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It uses asymmetric key pairs.

B.  

It uses symmetric key pairs.

C.  

It provides security using data encryption and digital signature.

D.  

It is a digital representation of information that identifies users.

Discussion 0
Questions 70

Which of the following protocols is used for destination and error reporting functions in datagram processing?

Options:

A.  

PPP

B.  

SRP

C.  

NTP

D.  

ICMP

Discussion 0
Questions 71

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.  

Single Loss Expectancy (SLE)

B.  

Annualized Rate of Occurrence (ARO)

C.  

Safeguard

D.  

Exposure Factor (EF)

Discussion 0
Questions 72

John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.  

Social engineering

B.  

Replay attack

C.  

Trojan horse

D.  

DoS

Discussion 0
Questions 73

A Security administrator wants to configure policies that dictate what types of network traffic are allowed in the network. Which types of signature should he use to configure such type of policies?

Options:

A.  

DoS signatures

B.  

Connection signatures

C.  

Exploit signatures

D.  

String signatures

Discussion 0
Questions 74

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Using Off-channel verification.

B.  

Using Secret keys for authentication.

C.  

Using basic authentication.

D.  

Using public key infrastructure authentication.

Discussion 0
Questions 75

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It can handle encrypted and unencrypted traffic equally.

B.  

It can detect events scattered over the network.

C.  

It is a technique that allows multiple computers to share one or more IP addresses.

D.  

It cannot detect events scattered over the network.

Discussion 0
Questions 76

You work as a Network Administrator for Net World Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. A Public Key Infrastructure (PKI) is installed on a server in the domain. You are planning to go on vacation for two weeks. Your team has three assistant administrators. You are required to accomplish the following tasks:

• Delegate the authority to the assistant administrators to issue, approve, and revoke certificates.

• The solution must involve least administrative burden.

Which of the following steps will you take to accomplish the tasks?

Options:

A.  

Assign the Certificate Managers role to the assistant administrator user accounts.

B.  

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the CA Administrator role to the CertAdmins group.

C.  

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the Enterprise Administrators role to the CertAdmins group.

D.  

Create a new global security group named CertAdmins.

Make the assistant administrators the members of the new group.

Assign the Certificate Managers role to the CertAdmins group.

Discussion 0
Questions 77

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated.

In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections.

Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

Options:

A.  

The laptop users will be able to use smart cards for getting authenticated.

B.  

None of the tasks will be accomplished.

C.  

Both tasks will be accomplished.

D.  

The wireless network communication will be secured.

Discussion 0
Questions 78

John works as a Security Administrator for Enet Inc. He uses a 4 digits personal identification number (PIN) to access the computer and a token is used to perform offline checking whether John has entered the correct PIN or not. Which of the following attacks is possible on John's computer?

Options:

A.  

Replay

B.  

Smurf

C.  

Man-In-The-Middle

D.  

Brute force

Discussion 0
Questions 79

You are the project manager of the GYG Project. A new scope change is being considered for your project. You are concerned, however, that the scope change may add costs, risks, and adversely affect the project schedule. What project management process is responsible for evaluating the full effect of a proposed scope change on your project?

Options:

A.  

Schedule change control

B.  

Scope change control

C.  

Integrated change control

D.  

Change Control Board approval process

Discussion 0
Questions 80

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You have recently added three new SCSI hard disk drives to a domain controller that already has two physical disk drives. The new SCSI disk drives are configured in a RAID-5 array. You are required to enhance the performance of the Active Directory database on the domain controller. Which of the following steps will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.  

Move the log files to a separate physical disk other than the one used in RAID-5 or used by the operating system.

B.  

Move the log files to the RAID-5 array.

C.  

Move the NTDS.DIT file to the RAID-5 array.

D.  

Move the NTDS.DIT file to a disk other than the one used in RAID-5 or used by the operating system.

Discussion 0
Questions 81

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

Options:

A.  

Application-level gateway

B.  

Proxy server

C.  

Firewall

D.  

DMZ

Discussion 0
Questions 82

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

Options:

A.  

Project Integration Management

B.  

Project Time Management

C.  

Project Scope Management

D.  

Project Risk Management

Discussion 0
Questions 83

Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources and information?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

Training and awareness

B.  

Employee registration and accounting

C.  

Network authentication

D.  

Encryption

E.  

Disaster preparedness and recovery plans

Discussion 0
Questions 84

You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?

Options:

A.  

Mail bombing

B.  

Distributed denial of service (DDOS) attack

C.  

Brute force attack

D.  

Malware installation from unknown Web sites

Discussion 0
Questions 85

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.  

Quantitative risk analysis

B.  

Seven risk responses

C.  

Qualitative risk analysis

D.  

A risk probability-impact matrix

Discussion 0