[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 191-200

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 191 – (Topic 2)

In which of the following social engineering attacks does an attacker first damage any part of the target#39;s equipment and then advertise himself as an authorized person who can help fix the problem.

  1. Impersonation attack

  2. In person attack

  3. Important user posing attack

  4. Reverse social engineering attack

Answer: D

Question No: 192 – (Topic 2)

You are the project manager of the HQQ Project for your company. You are working with your project stakeholders to discuss the risks in the project that can adversely affect the project objectives. You are discussing the possibilities of causes for an identified risk event in your project. Your stakeholder is confused on the difference between causes and risk events. Which of the following is NOT an example of a cause for a project risk?

  1. Schedule constraints on the project

  2. Limited team members to complete the project work

  3. Quality assurance programs within the company

  4. Work permit requirements

Answer: C

Question No: 193 – (Topic 2)

You are configuring IPS (Intrusion Prevention System) on a Cisco IOS router. The IPS Policy Wizard window opens when you confirm the SDEE messages. Which of the following tasks can you perform using the IPS Policy Wizard window?

Each correct answer represents a complete solution. Choose all that apply.

  1. Select the direction of traffic for inspecting the events.

  2. Select an encryption method to improve security.

  3. Select the interface for applying the IPS rule.

  4. Select the SDF file which a user can use.

Answer: A,C,D

Question No: 194 – (Topic 2)

Which of the following documents is described in the statement below?

quot;It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.quot;

  1. Risk register

  2. Quality management plan

  3. Project charter

  4. Risk management plan

Answer: A

Question No: 195 – (Topic 2)

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

  1. File integrity auditing

  2. Reconnaissance

  3. Spoofing

  4. Shoulder surfing

Answer: A

Question No: 196 – (Topic 2)

You are a project manager who is completing a project for another organization. The project you are managing will have phased deliverables throughout the project.

Stakeholders are required to complete scope validation at the end of each phase so that the project can move forward. Your payment requests will also be attached to the approval of each phase so it is important to you, on several levels, that the stakeholders participate in scope validation as soon as they are requested. You have documented the process for reviewing the product acceptance criteria with the stakeholders.

What project document details the product acceptance criteria in all the projects?

  1. Statement of Work

  2. Project scope statement

  3. Project management plan

  4. Contract

Answer: B

Question No: 197 – (Topic 2)

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn#39;t know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

  1. Replay attack

  2. Social Engineering attack

  3. Brute Force attack

  4. War dialing attack

Answer: B

Question No: 198 – (Topic 2)

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

  1. Cost plus incentive fee

  2. Cost plus percentage of costs

  3. Time and materials

  4. Fixed fee

Answer: B

Question No: 199 – (Topic 2)

Holly is the project manager of the GHQ Project for her organization. The project is using the AAA IT Integrators Corporation as a vendor to do a portion of the project work. Mitch Smith, the IT Directors for the AAA IT Integrators Corporation, reports that his team has completed the project work. Holly and her team review the deliverables and she confirms that Mitch#39;s team has indeed completed the work according to the statement of work. What document should Holly refer to now to determine the next course of action with the AAA IT Integrators Corporation?

  1. Procurement management plan

  2. Statement of Work

  3. Contract

  4. Project management plan

Answer: C

Question No: 200 – (Topic 2)

David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

  1. Striped volume

  2. Spanned volume

  3. RAID-5 volume

  4. Mirrored volume

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE