[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 231-240

2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 231 – (Topic 2)

Which key of the Asymmetric encryption is used to encrypt the data when a user sends a message or data to another user?

  1. Symmetric

  2. Private

  3. Public

  4. Asymmetric

Answer: C

Question No: 232 – (Topic 2)

Which of the following is used to identify a particular 802.11 wireless LAN?

  1. Basic Service Set (BSS)

  2. Basic Service Set Identifier (BSSID)

  3. Independent Basic Service Set (IBSS)

  4. Service Set Identifier (SSID)

Answer: D

Question No: 233 – (Topic 2)

You work as a Network Administrator for PassGuide Inc. Adam, your assistant, wants to perform a backup of the server. Which of the following authentication methods will you assign to Adam?

  1. RBAC

  2. OrBAC

  3. DAC

  4. NAC

Answer: A

Question No: 234 – (Topic 2)

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as .

  1. True positive

  2. True negative

  3. False negative

  4. False positive

Answer: D

Question No: 235 – (Topic 2)

Which of the following can be used as a countermeasure against the SQL injection attack? Each correct answer represents a complete solution. Choose two.

  1. mysql_escape_string()

  2. session_regenerate_id()

  3. mysql_real_escape_string()

  4. Prepared statement

Answer: C,D

Question No: 236 – (Topic 2)

Your project spans the entire organization. You would like to assess the risk of the project but are worried that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your worry is based on the fact that some employees would not want to publicly identify risk events that could make their supervisors look bad. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

  1. SWOT analysis

  2. Delphi technique

  3. Isolated pilot groups

  4. Root cause analysis

Answer: B

Question No: 237 – (Topic 2)

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

  1. Vulnerability attack

  2. Denial-of-Service attack

  3. Impersonation attack

  4. Social Engineering attack

Answer: B

Question No: 238 – (Topic 2)

Which of the following IEEE standards is defined to enhance security of Wireless LANs (WLANs) that follow the IEEE 802.11 standard?

A. 802.11b B. 802.1X C. 802.11a D. 802.11g

Answer: B

Question No: 239 – (Topic 2)

Which of the following types of attacks cannot be prevented by a firewall? Each correct answer represents a complete solution. Choose all that apply.

  1. Ping flood attack

  2. Phishing attack

  3. Shoulder surfing attack

  4. URL obfuscation attack

Answer: B,C,D

Question No: 240 – (Topic 2)

Which of the following is used to allow or deny access to network resources?

  1. NFS

  2. System hardening

  3. ACL

  4. Spoofing

Answer: C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE