[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 321-330

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 321 – (Topic 3)

Which of the following sections come under the ISO/IEC 27002 standard?

  1. Financial assessment

  2. Security policy

  3. Risk assessment

  4. Asset management

Answer: B,C,D

Question No: 322 – (Topic 3)

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card?

Each correct answer represents a complete solution. Choose two.

  1. These tools can determine the authorization status of an access point.

  2. These tools cannot detect rogue access points if the victim is using data encryption.

  3. These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

  4. These tools can determine the rogue access point even when it is attached to a wired network.

Answer: A,C

Question No: 323 – (Topic 3)

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

  1. SSHGuard

  2. nmap

  3. Fail2Ban

  4. portsentry

  5. OpenSSL

Answer: C,D

Question No: 324 – (Topic 3)

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

A. 18 U.S.C. 2510

B. 18 U.S.C. 1362

C. 18 U.S.C. 1030

D. 18 U.S.C. 2701

E. 18 U.S.C. 1029

Answer: B

Question No: 325 – (Topic 3)

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

  1. Quantitative risk analysis

  2. Seven risk responses

  3. Qualitative risk analysis

  4. A risk probability-impact matrix

Answer: C

Question No: 326 – (Topic 3)

You are the project manager of the Workstation Improvement Project for your organization. This project will replace 925 workstations with new computers for your company#39;s employees. Mark Jones, the sales manager, has requested that your project add 250 laptops as part of this project as his employees do not have workstations as they travel as part of the sales process. Mark insists that his department in the company can pay for the cost of the laptops. All of the following are components that will be affected by this change request except for which one?

  1. There will be a need for additional time to install the laptops.

  2. There will be a need for an additional project scope statement because of the change request.

  3. There will be a need for additional procurement management processes.

  4. There will be a need for additional risk analysis for the laptops.

Answer: B

Question No: 327 – (Topic 3)

You have been hired as a project manager for a project. The initial project planning predicts a benefitcost ratio (BCR) of the project as 3.5. What does this figure mean?

  1. A loss of 3.5 percent

  2. A profit of 3.5 percent

  3. A loss of $3.5 for each dollar expended

  4. A payback of $3.5 for each dollar expended

Answer: D

Question No: 328 – (Topic 3)

Which of the following files must be configured to enable hostname lookups to use the Domain Name Service (DNS)?

  1. libnss_ldap

  2. /etc/pam.d

  3. /etc/nsswitch.conf

  4. /etc/pam.d/sshd

Answer: C

Question No: 329 – (Topic 3)

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

  1. It is consists of various protocols present in each layer.

  2. It provides end-to-end connectivity specifying how data should be formatted, addressed,

    transmitted, routed and received at the destination.

  3. It is generally described as having five abstraction layers.

  4. It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

Answer: A,B,D

Question No: 330 – (Topic 3)

What is another term that can be assigned to the pre-program analysis and research to determine if a program should be initiated?

  1. Business case creation

  2. Feasibility study creation

  3. Program scope statement definition

  4. Program charter creation

Answer: B

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE