[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 261-270

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 261 – (Topic 2)

Which of the following statements are true about WPA?

Each correct answer represents a complete solution. Choose all that apply.

  1. WPA provides better security than WEP.

  2. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.

  3. WPA-PSK converts the passphrase into a 256-bit key.

  4. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.

Answer: A,B,C,D

Question No: 262 – (Topic 2)

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

  1. He should upgrade his antivirus program.

  2. He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

  3. He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

  4. He should restore his Windows settings.

Answer: A,B

Question No: 263 – (Topic 2)

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

  1. File-based

  2. Anomaly-based

  3. Signature-based

  4. Network-based

Answer: B

Question No: 264 – (Topic 2)

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

  1. Disaster recovery plan

  2. Business continuity plan

  3. Contingency plan

  4. Continuity of Operations Plan

Answer: C

Question No: 265 – (Topic 2)

In what type of attack does an attacker capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network?

  1. Dictionary attack

  2. Ping flood attack

  3. DoS attack

  4. Replay attack

Answer: D

Question No: 266 – (Topic 2)

Which of the following statements are true about an application-level gateway? Each correct answer represents a complete solution. Choose all that apply.

  1. It allows client applications to use dynamic ephemeral TCP/UDP ports to communicate with the known ports used by the server applications.

  2. It does not allow customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application protocols.

  3. It is a security component that is added to a firewall or NAT employed in a computer network.

  4. It converts the network layer address information found inside an application payload. The hosts can be on either side of the firewall/NAT.

Answer: A,C,D

Question No: 267 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

  1. The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

  2. The laptop will be able to access the wireless network but the security will be compromised.

  3. The WAP will allow the connection with the guest account#39;s privileges.

  4. The laptop will not be able to access the wireless network.

Answer: D

Question No: 268 – (Topic 2)

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain based network. The network contains four Windows Server 2008 member servers with different roles and 120 Windows Vista client computers. Mark has implemented a Streaming Media Services server on the network. Users complain that they are unable to view the contents when using their Windows Media Players. Mark investigates and finds that the firewall only allows ports 80 and 443 for traffic. Mark wants to ensure that the users can view the contents. What will Mark to do to accomplish the task?

  1. Configure firewall to allow port 110

  2. Re-install Windows Media player on the users#39; computers

  3. Configure firewall to allow port 25

  4. Enable HTTP Streaming

Answer: D

Question No: 269 – (Topic 2)

PsPasswd is a tool used by network administrators to change an account password on the local or remote system. Which of the following are the command syntaxes used by the PsPasswd tool?

Each correct answer represents a complete solution. Choose all that apply.

  1. -t

  2. -u

  3. username

  4. NewPassword

Answer: B,C,D

Question No: 270 – (Topic 2)

Which of the following terms describes the statement given below?

quot;It is a cryptographic protocol that provides security and data integrity for communications over networks such as the Internet.quot;

  1. NTP

  2. SSH

  3. SNMP2/3

  4. TSL

Answer: D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE