[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 181-190

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 181 – (Topic 2)

Which of the following processes is described in the statement below?

quot;This is the process of numerically analyzing the effect of identified risks on overall project objectives.quot;

  1. Identify Risks

  2. Perform Quantitative Risk Analysis

  3. Monitor and Control Risks

  4. Perform Qualitative Risk Analysis

Answer: B

Question No: 182 – (Topic 2)

Which of the following techniques is based on a set of criteria that has been acquired in a specific knowledge area or product area?

  1. Expert judgment

  2. Function point

  3. Program Evaluation Review Technique (PERT) chart

  4. Delphi technique

Answer: A

Question No: 183 – (Topic 2)

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

  1. Code red

  2. Beast

  3. SQL Slammer

  4. Klez

Answer: C

Question No: 184 – (Topic 2)

Which of the following types of authentication is generally used for public Internet Web sites?

  1. Anonymous authentication

  2. Integrated Windows authentication

  3. Basic authentication

  4. Digest authentication

Answer: A

Question No: 185 – (Topic 2)

Which of the following types of firewall ensures that the packets are part of the established session?

  1. Stateful inspection firewall

  2. Circuit-level firewall

  3. Switch-level firewall

  4. Application-level firewall

Answer: A

Question No: 186 – (Topic 2)

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

  1. PDA Hijacking

  2. Session Hijacking

  3. Privilege Escalation

  4. Bluesnarfing

Answer: D

Question No: 187 – (Topic 2)

You are responsible for network security at a defense contractor. You are very concerned about sensitive data not getting out of your network. You have specific concerns about employees or contractors sending out files via FTP, or even spyware sending out data. You have blocked and monitored ports (as many as you can) on your firewall, and of course, run an anti spyware package.

Which of the following is another step you should take in preventing sensitive data from being sent out of your network without authorization?

  1. Implement an IDS.

  2. Utilize a DMZ firewall.

  3. Block all employees from emailing outside your network.

  4. Employ network wide anti virus.

Answer: A

Question No: 188 – (Topic 2)

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

  1. Social engineering

  2. Smurf

  3. Denial-of-Service

  4. Man-in-the-middle

Answer: A

Question No: 189 – (Topic 2)

Which of the following statements about a certification authority (CA) is true?

  1. It is a non-profit organization that sets security standards for e-commerce.

  2. It issues physical certificates that confirm the identity of entities.

  3. It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

  4. It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

Answer: D

Question No: 190 – (Topic 2)

You work as an IT Technician for PassGuide Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company#39;s wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

  1. MAC Filtering

  2. RAS

  3. WEP

  4. SSID

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE