[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 121-130

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 121 – (Topic 1)

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

  1. Warm site

  2. Hot site

  3. Off site

  4. Cold site

Answer: D

Question No: 122 – (Topic 1)

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

  1. Automated penetration testing

  2. Code review

  3. Manual penetration testing

  4. Vulnerability scanning

Answer: D

Question No: 123 – (Topic 1)

Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?

  1. PERT

  2. CPM

  3. FP

  4. Gantt

Answer: A

Question No: 124 – (Topic 1)

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

  1. Stick

  2. ADMutate

  3. Absinthe

  4. Fragroute

Answer: C

Question No: 125 – (Topic 1)

Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?

  1. WEP

  2. WAP

  3. L2TP

  4. IPSec

Answer: A

Question No: 126 – (Topic 1)

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

  1. Security policy

  2. Auditing

  3. Security awareness training

  4. Data Backup

Answer: A,C

Question No: 127 – (Topic 1)

Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project

team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn#39;t specifically ask for the added features. This scenario is an example of which one of the following?

  1. Scope creep

  2. Gold plating

  3. Change management

  4. Value added change

Answer: B

Question No: 128 – (Topic 1)

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

  1. Armored virus

  2. Stealth virus

  3. Multipartite virus

  4. Polymorphic virus

Answer: A

Question No: 129 – (Topic 1)

Which of the following statements about Encapsulating Security Payload (ESP) is true?

  1. ESP is always used in combination with Authentication Header (AH).

  2. ESP can encrypt data and verify data integrity.

  3. ESP is never used in combination with Authentication Header (AH).

  4. ESP only verifies data integrity.

Answer: B

Question No: 130 – (Topic 1)

You work as a Network Administrator for Net Perfect Inc. The company has a Windows

Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy?

  1. Create a GPO.

    Configure Audit Object Access. Attach the GPO to the domain.

  2. Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file.

  3. Enable debug logging on the DNS server.

  4. Create a new OU.

Move the DNS server account to the OU. Create a GPO.

Configure Audit Logon events. Attach the GPO to the OU.

Answer: C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE