[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 1-10

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 1 – (Topic 1)

Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals:

No external traffic should be allowed into the network.

Administrators should be able to restrict the websites which can be accessed by the internal users.

Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.)

  1. Internet Connection Sharing (ICS)

  2. Network Address Translator (NAT)

  3. Firewall

  4. Proxy Server

  5. Routing and Remote Access Service (RRAS)

Answer: D

Question No: 2 – (Topic 1)

Which of the following backup sites takes the longest recovery time?

  1. Cold site

  2. Hot site

  3. Warm site

  4. Mobile backup site

Answer: A

Question No: 3 – (Topic 1)

You are the project manager for the TTR project. You are in the process of gathering information for risk identification. You ask experts to participate in the process through their

emails for maintaining anonymity. You collect the responses, summarize them, and are then re-circulated to the experts for further comment. Which of the following techniques are you using for risk identification?

  1. SWOT analysis

  2. Delphi

  3. Expert judgment

  4. Brainstorming

Answer: B

Question No: 4 – (Topic 1)

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you#39;ll first need to understand all of the following except for which one?

  1. Summary milestone for the likely project phases

  2. Measurable project objectives and related success criteria

  3. Summary budget

  4. Quality improvement program your company uses

Answer: D

Question No: 5 – (Topic 1)

You work as a Network Administrator for McNeil Inc. The company has a Windows Active Directorybased single domain single forest network. The functional level of the forest is Windows Server 2003. The company#39;s management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

  1. Both tasks will be accomplished.

  2. The wireless network communication will be secured.

  3. None of the tasks will be accomplished.

  4. The laptop users will be able to use smart cards for getting authenticated.

Answer: B

Question No: 6 – (Topic 1)

Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code?

  1. Worm

  2. Logic Bomb

  3. Polymorphic Virus

  4. Virus

Answer: B

Question No: 7 – (Topic 1)

You have installed Windows Vista Home Premium on your home computer. The computer is connected to the Internet through an ADSL connection. You want to protect yourself from the traps of fraudulent sites. Which of the following features of Internet Explorer 7 will you use?

  1. Pop-up blocker

  2. Protected mode

  3. Privacy settings

  4. Phishing filter

Answer: D

Question No: 8 – (Topic 1)

Which of the following options is an approach to restricting system access to authorized users?

  1. MIC

  2. MAC

  3. RBAC

  4. DAC

Answer: C

Question No: 9 – (Topic 1)

Which of the following domains of the DNS hierarchy consists of categories found at the end of domain names, such as .com or .uk and divides the domains into organizations (.org), businesses (.com), countries (.uk), and other categories?

  1. Top-level domain

  2. Root-level domain

  3. Second level domain

  4. Name server

Answer: A

Question No: 10 – (Topic 1)

Which of the following processes is NOT a part of the Project Procurement Management Knowledge Area?

  1. Develop Project Management Plan

  2. Request Seller Responses

  3. Contract Administration

  4. Plan Purchases and Acquisitions

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE