EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html
GIAC Security Leadership Certification (GSLC)
Question No: 361 – (Topic 3)
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
What ports are open on our network systems
What hosts are available on the network
Identify unauthorized wireless access points
What services (application name and version) those hosts are offering
What operating systems (and OS versions) they are running
What type of packet filters/firewalls are in use Which of the following tools is Victor using?
-
Nmap
-
Sniffer
-
Kismet
-
Nessus
Answer: A
Question No: 362 – (Topic 3)
In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?
-
In person attack
-
Third-party authorization attack
-
Important user posing attack
-
Impersonation attack
Answer: D
Question No: 363 – (Topic 3)
Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
-
Macro
-
Polymorphic
-
Logic Bomb
-
Boot sector
Answer: B
Question No: 364 – (Topic 3)
Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?
-
Project Cost Management
-
Project Integration Management
-
Project Time Management
-
Project Scope Management
-
Project Quality Management
Answer: A
Question No: 365 – (Topic 3)
Which of the following uses public key cryptography to encrypt the contents of files?
-
NTFS
-
DFS
-
RFS
-
EFS
Answer: D
Question No: 366 – (Topic 3)
Complete the following sentence: Quality control is a(n) process while quality assurance is a(n) process.
-
Inspection, costly
-
Management, inspection
-
Inspection, prevention
-
Prevention, inspection.
Answer: C
Question No: 367 – (Topic 3)
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
Network diagrams of the we-are-secure infrastructure
Source code of the security tools
IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
-
Blackbox
-
Alpha testing
-
Whitebox
-
Graybox
Answer: C
Question No: 368 – (Topic 3)
Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.
-
It is the core routing protocol of the Internet.
-
It was designed as a replacement for TELNET and other insecure shells.
-
It is a network protocol used primarily on Linux and Unix based systems.
-
It allows data to be exchanged using a secure channel between two networked devices.
Answer: B,C,D
Question No: 369 – (Topic 3)
Tim is working as a project manager for the TCH project. The project is in the final stages and the closing processes are being performed. He has prepared the lessons learned document. This document will be the part of .
-
The project#39;s performance record
-
The project charter
-
The risk register
-
The company#39;s organizational process assets
Answer: D
Question No: 370 – (Topic 3)
You are a project manager for a recycling company. You are in the process of reviewing proposals from sellers for recycling equipment. You notice the scope statement states the company required to abide by the environmental agencies regulations regarding waste. As a result, you select proposals that automatically include features such as scrubbers and baghouses to reduce hazardous waste. Which of the following is true regarding the scope statement?
-
It includes an introductory schedule management plan.
-
Knowing the limits and the projects required helps determine the resources to purchase.
-
It is a deliverable-oriented collection of project components.
-
It is the methods and procedures an organization must follow to create the activity list.
Answer: B
100% Free Download!
–Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
–Download 2017 EnsurePass GSLC Full Exam PDF and VCE
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
2017 EnsurePass IT Certification PDF and VCE
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF