Pass4itsure > GIAC > GIAC Information Security > GSLC > GSLC Online Practice Questions and Answers

GSLC Online Practice Questions and Answers

Questions 4

John works as a Programmer for We-are-secure Inc. On one of his routine visits to the company, he noted down the passwords of the employees while they were typing them on their computer screens. Which of the following social engineering attacks did he just perform?

A. Shoulder surfing

B. Important user posing

C. Dumpster diving

D. Authorization by third party

Buy Now
Questions 5

Which of the following options is an approach to restricting system access to authorized users?

A. MIC

B. MAC

C. RBAC

D. DAC

Buy Now
Questions 6

Which of the following statements about Digest authentication are true? Each correct answer represents a complete solution. Choose two.

A. Digest authentication is a more secure authentication method as compared to Basic authentication.

B. In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

C. Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D. In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

Buy Now
Questions 7

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

A. Intrusion detection system (IDS)

B. Demilitarized zone (DMZ)

C. Packet filtering

D. Firewall

Buy Now
Questions 8

Which of the following is the best way of protecting important data against virus attack?

A. Using strong passwords to log on to the network.

B. Taking daily backup of data.

C. Updating the anti-virus software regularly.

D. Implementing a firewall.

Buy Now
Questions 9

You are the project manager of the Workstation Improvement Project for your organization. This project will replace 925 workstations with new computers for your company's employees. Mark Jones, the sales manager, has requested that your project add 250 laptops as part of this project as his employees do not have workstations as they travel as part of the sales process. Mark insists that his department in the company can pay for the cost of the laptops. All of the following are components that will be affected by this change request except for which one?

A. There will be a need for additional time to install the laptops.

B. There will be a need for an additional project scope statement because of the change request.

C. There will be a need for additional procurement management processes.

D. There will be a need for additional risk analysis for the laptops.

Buy Now
Questions 10

Which of the following terms describes an attempt to transfer DNS zone data?

A. Reconnaissance

B. Dumpster diving

C. Spam

D. Encapsulation

Buy Now
Questions 11

You are the program manager for your organization. Management has asked that you determine when resources, such as leased equipment, are no longer needed so that you may release the resources to save time, money, and utilization of resources within your program. What program management process is management asking you to perform?

A. Contract administration

B. Resource management

C. Procurement management

D. Resource control

Buy Now
Questions 12

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises.

Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

A. Cell Phones

B. Individual scanners

C. USB Drives

D. Individual printers

Buy Now
Questions 13

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A. IFB

B. RFI

C. RFP

D. RFQ

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Apr 29, 2024
Questions: 701
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99