[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 331-340

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 331 – (Topic 3)

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory- based single forest domain-based network. The company#39;s management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

  1. The laptop users will be able to use smart cards for getting authenticated.

  2. None of the tasks will be accomplished.

  3. Both tasks will be accomplished.

  4. The wireless network communication will be secured.

Answer: D

Question No: 332 – (Topic 3)

Which type of attack is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs?

  1. Bluesnarfing

  2. Bluebugging

  3. Blue Jacking

  4. Bluecast

Answer: A

Question No: 333 – (Topic 3)

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

  1. SSHGuard

  2. portsentry

  3. OpenSSL

  4. nmap

  5. Fail2Ban

Answer: B,E

Question No: 334 – (Topic 3)

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies.

Which of the following are some of its critical steps?

Each correct answer represents a complete solution. Choose two.

  1. Awareness and Training Material Effectiveness

  2. Awareness and Training Material Implementation

  3. Awareness and Training Program Design

  4. Awareness and Training Material Development

Answer: C,D

Question No: 335 – (Topic 3)

Which of the following is the best way of protecting important data against virus attack?

  1. Using strong passwords to log on to the network.

  2. Taking daily backup of data.

  3. Updating the anti-virus software regularly.

  4. Implementing a firewall

Answer: C

Question No: 336 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

Ensurepass 2017 PDF and VCE

The e-mail that John has received is an example of .

  1. Social engineering attacks

  2. Virus hoaxes

  3. Spambots

  4. Chain letters

Answer: D

Question No: 337 – (Topic 3)

Which of the following terms describes the statement given below?

quot;It is a service on a computer system (usually a server) that delays incoming connections for as long as possible. The technique was developed as a defense against a computer worm, and the idea is that network abuses, such as spamming or broad scanning, are less effective if they take too long.quot;

  1. Honeytokens

  2. Honeynet

  3. Honeypot

  4. Tarpit

Answer: D

Question No: 338 – (Topic 3)

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

  1. Corroborating

  2. Direct

  3. Circumstantial

  4. Incontrovertible

Answer: C

Question No: 339 – (Topic 3)

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

  1. John the Ripper

  2. Cheops-ng

  3. AiroPeek

  4. Sam Spade

Answer: C

Question No: 340 – (Topic 3)

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

  1. Active IDS

  2. Passive IDS

  3. Network-based IDS

  4. Signature-based IDS

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE