[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 41-50

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 41 – (Topic 1)

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Which of the following tools works by placing the host system network card into the promiscuous mode?

  1. Sniffer

  2. THC-Scan

  3. NetStumbler

  4. Snort

Answer: A

Question No: 42 – (Topic 1)

Which system is designed to analyze, detect, and report on security-related events?

  1. HIPS

  2. NIPS

  3. NIDS

  4. HIDS

Answer: B

Question No: 43 – (Topic 1)

Which of the following viruses/worms uses the buffer overflow attack?

  1. Code red worm

  2. Klez worm

  3. Nimda virus

  4. Chernobyl (CIH) virus

Answer: A

Question No: 44 – (Topic 1)

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

  1. Authentication

  2. Integrity

  3. Non-repudiation

  4. Confidentiality

Answer: D

Question No: 45 – (Topic 1)

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

  1. Spoofing

  2. Phishing

  3. Password guessing attack

  4. Replay attack

Answer: B

Question No: 46 – (Topic 1)

Which of the following statements are true about MS-CHAPv2?

Each correct answer represents a complete solution. Choose all that apply.

  1. It can be replaced with EAP-TLS as the authentication mechanism for PPTP.

  2. It provides an authenticator-controlled password change mechanism.

  3. It is subject to offline dictionary attacks.

  4. It is a connectionless protocol.

Answer: A,B,C

Question No: 47 – (Topic 1)

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domainbased network. The network contains five Windows 2003 member servers and 300 Windows XP Professional client computers. Mark is setting up a wireless network for the company. He is planning to implement 802.1x authentication for this new wireless network.

Mark is not planning to use a public key infrastructure (PKI) and certificates for authentication. Mark also wants an encrypted authentication channel and a fast reconnect using cached session keys. Which of the following authentication methods will he use to accomplish the task?

  1. Protected EAP (PEAP)

  2. EAP-Transport Layer Security (EAP-TLS)

  3. Shared Key authentication

  4. Digest authentication

Answer: A

Question No: 48 – (Topic 1)

You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?

  1. WPA 2

  2. WEP

  3. TKIP

  4. WPA

Answer: A

Question No: 49 – (Topic 1)

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

  1. Stealth

  2. Snow

  3. Blindside

  4. ImageHide

Answer: A

Question No: 50 – (Topic 1)

Which of the following can provide security against man-in-the-middle attack?

  1. Strong data encryption during travel

  2. Firewall

  3. Anti-virus programs

  4. Strong authentication method

Answer: A

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE