[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 51-60

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 51 – (Topic 1)

Which of the following are considered Bluetooth security violations? Each correct answer represents a complete solution. Choose two.

  1. Bluebug attack

  2. Bluesnarfing

  3. SQL injection attack

  4. Social engineering

  5. Cross site scripting attack

Answer: A,B

Question No: 52 – (Topic 1)

Which of the following statements is true about the difference between worms and Trojan horses?

  1. Trojan horses are a form of malicious codes while worms are not.

  2. Trojan horses are harmful to computers while worms are not.

  3. Worms replicate themselves while Trojan horses do not.

  4. Worms can be distributed through emails while Trojan horses cannot.

Answer: C

Question No: 53 – (Topic 1)

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

  1. Cell Phones

  2. Individual scanners

  3. USB Drives

  4. Individual printers

Answer: A,B,C,D

Question No: 54 – (Topic 1)

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

  1. Steganography

  2. Email spoofing

  3. Social engineering

  4. Web ripping

Answer: A

Question No: 55 – (Topic 1)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

  1. They allow an attacker to conduct a buffer overflow.

  2. They allow an attacker to replace utility programs that can be used to detect the attacker#39;s activity.

  3. They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

  4. They allow an attacker to run packet sniffers secretly to capture passwords.

Answer: B,C,D

Question No: 56 – (Topic 1)

Which of the following relies on a physical characteristic of the user to verify his identity?

  1. Kerberos v5

  2. Social Engineering

  3. CHAP

  4. Biometrics

Answer: D

Question No: 57 – (Topic 1)

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domain-based network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him. Which of the following steps will you take to accomplish the task?

  1. Remove domain names of such emails from the Safe Sender#39;s list.

  2. Configure phishing filter in Internet Explorer 7.0. Configure it to filter all phishing mails.

  3. Configure phishing filter in Windows Mail.

    Configure it to move such mails to the Junk Mail folder.

  4. Add domain names of such emails in the Block Sender#39;s list.

Answer: C

Question No: 58 – (Topic 1)

You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?

  1. A Virus

  2. A reactive IDS.

  3. A Honey Pot

  4. A Polymorphic Virus

Answer: C

Question No: 59 – (Topic 1)

Which of the following protocols is used as a transport protocol for Internet dial-up connections?

  1. SMTP

  2. SNMP

  3. DHCP

  4. PPP

Answer: D

Question No: 60 – (Topic 1)

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme?

Each correct answer represents a complete solution. Choose all that apply.

  1. Kerberos requires continuous availability of a central server.

  2. Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

  3. Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject#39;s passwords.

  4. Kerberos requires the clocks of the involved hosts to be synchronized.

Answer: A,C,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE