[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 301-310

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 301 – (Topic 3)

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

  1. Install a host-based IDS

  2. Enable verbose logging on the firewall

  3. Install a DMZ firewall

  4. Install a network-based IDS

Answer: D

Question No: 302 – (Topic 3)

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user#39;s data?

  1. Malware protection

  2. Firewall

  3. Automatic updating

  4. Other security settings

Answer: C

Question No: 303 – (Topic 3)

US Garments wants all encrypted data communication between corporate office and remote location. They want to achieve following results:

  • Authentication of users

  • Anti-replay

  • Anti-spoofing

  • IP packet encryption

    They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?

    (Click the Exhibit button on the toolbar to see the case study.)

    Each correct answer represents a complete solution. Choose all that apply.

    1. Authentication of users

    2. Anti-spoofing

    3. Anti-replay

    4. IP packet encryption

    Answer: B,C

    Question No: 304 – (Topic 3)

    Nancy is the project manager for YYF project. She is receiving bids and proposals from different vendors. She will apply previously defined selection criteria to select one or more sellers who are qualified to perform the work and acceptable as a seller. She is in which of the following processes?

    1. Close Procurements

    2. Conduct Procurements

    3. Plan Procurements

    4. Administer Procurements

    Answer: B

    Question No: 305 – (Topic 3)

    Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric#39;s organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric#39;s organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

    1. Yes, the ZAS Corporation did not choose to terminate the contract work.

    2. It depends on what the termination clause of the contract stipulates.

    3. It depends on what the outcome of a lawsuit will determine.

    4. No, the ZAS Corporation did not complete all of the work.

    Answer: B

    Question No: 306 – (Topic 3)

    John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company#39;s Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

    1. Social engineering

    2. Replay attack

    3. Trojan horse

    4. DoS

    Answer: A

    Question No: 307 – (Topic 3)

    Which of the following techniques is based on a set of criteria that has been acquired in a specific knowledge area or product area?

    1. Expert judgment

    2. Program Evaluation Review Technique (PERT) chart

    3. Function Point Analysis (FP Analysis)

    4. Delphi technique

    Answer: A

    Question No: 308 – (Topic 3)

    You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you take to accomplish the task?

    Each correct answer represents a complete solution. Choose all that apply.

    1. Implement the IEEE 802.1X authentication for the wireless network.

    2. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

    3. Implement the open system authentication for the wireless network.

    4. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

    5. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

    Answer: A,B,E

    Question No: 309 – (Topic 3)

    Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

    1. Macro virus

    2. Stealth virus

    3. E-mail virus

    4. Polymorphic virus

    Answer: B

    Question No: 310 – (Topic 3)

    You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.

    The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.

    Which of the following types of security attacks do you think it is?

    1. Social engineering

    2. Man-in-the-middle

    3. Hacking

    4. Spoofing

    Answer: A

    100% Free Download!
    Download Free Demo:GSLC Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass GSLC Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE