[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 371-380

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 371 – (Topic 3)

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

  1. Configuration Identification

  2. Configuration Item Costing

  3. Configuration Status Accounting

  4. Configuration Verification and Auditing

Answer: B

Question No: 372 – (Topic 3)

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

  1. Building up an incident response kit

  2. Setting up the initial position after an incident

  3. Working with QA to validate security of the enterprise

  4. Organizing a solution to remove an incident

Answer: A

Question No: 373 – (Topic 3)

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux- based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

  1. Dsniff

  2. ethereal

  3. Despoof

  4. Neotrace

Answer: C

Question No: 374 – (Topic 3)

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

  1. Cost

  2. Schedule

  3. Contract

  4. Resources

Answer: C

Question No: 375 – (Topic 3)

You work as an Exchange Administrator for McRobert Inc. You are configuring a new Exchange 2000 Server computer and two storage groups, group A and group B, on your network. You have to configure the physical disks on the Exchange 2000 Server computer to provide better performance and availability. Which configuration will you use to achieve this?

  1. Mirrored — Transaction Log Files (group A) Mirrored — Transaction Log Files (group B) RAID5 — Information store (groups A and B)

  2. Single drive — Transaction Log Files (group A) Single drive — Transaction Log Files (group B) RAID5 —– Information Store (groups A and B)

  3. Mirrored — Transaction Log Files ( groups A and B) RAID5 — Information Store (groups A and B)

  4. Single drive — Transaction Log Files (group A) Single drive — Transaction Log Files (group B) RAID5 —— Information Store (group A)

RAID5 —— Information Store (group B)

Answer: D

Question No: 376 – (Topic 3)

John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?

A. 18 U.S.C. 1362

B. 18 U.S.C. 2701

C. 18 U.S.C. 1030

D. 18 U.S.C. 2510

Answer: C

Question No: 377 – (Topic 3)

Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources and information?

Each correct answer represents a complete solution. Choose three.

  1. Training and awareness

  2. Employee registration and accounting

  3. Network authentication

  4. Encryption

  5. Disaster preparedness and recovery plans

Answer: A,B,E

Question No: 378 – (Topic 3)

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

  1. Using Off-channel verification.

  2. Using Secret keys for authentication.

  3. Using basic authentication.

  4. Using public key infrastructure authentication.

Answer: A,B,D

Question No: 379 – (Topic 3)

Which of the following are the algorithms contained by the digital signature policy? Each correct answer represents a complete solution. Choose all that apply.

  1. Information validation

  2. Signing

  3. Signature verifying

  4. Key Generation

Answer: B,C,D

Question No: 380 – (Topic 3)

Which of the following tools can be used to automate the MITM attack?

  1. Airjack

  2. Kismet

  3. IKECrack

  4. Hotspotter

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE