[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 61-70

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 61 – (Topic 1)

Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.

  1. Internet bots

  2. Spyware

  3. Anti-virus software

  4. Scripts

Answer: A,D

Question No: 62 – (Topic 1)

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker#39;s intentions?

  1. Land attack

  2. Internal attack

  3. DoS attack

  4. Reconnaissance attack

Answer: C

Question No: 63 – (Topic 1)

Which of the following RAID levels will you use to implement a RAID system for providing fault tolerance to a database?

  1. RAID 10

  2. RAID 1

  3. RAID 5

  4. RAID 0

Answer: B

Question No: 64 – (Topic 1)

What is the term used to describe the cost of the solution after the solution has been implemented in production by a vendor?

  1. Total cost of ownership

  2. Total ownership costing

  3. Sustainability fees

  4. Lifecycle maintenance fees

Answer: A

Question No: 65 – (Topic 1)

Which of the following are the countermeasures against WEP cracking? Each correct answer represents a part of the solution. Choose all that apply.

  1. Changing keys often.

  2. Using the longest key supported by hardware.

  3. Using a 16 bit SSID.

  4. Using a non-obvious key.

Answer: A,B,D

Question No: 66 – (Topic 1)

John works as a Programmer for We-are-secure Inc. On one of his routine visits to the company, he noted down the passwords of the employees while they were typing them on their computer screens.

Which of the following social engineering attacks did he just perform?

  1. Shoulder surfing

  2. Important user posing

  3. Dumpster diving

  4. Authorization by third party

Answer: A

Question No: 67 – (Topic 1)

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

  1. Implement a network based IDS.

  2. Implement a passive IDS

  3. Implement a stateful packet inspection firewall.

  4. Implement a honey pot.

Answer: D

Question No: 68 – (Topic 1)

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

  1. Containment

  2. Recovery

  3. Identification

  4. Eradication

Answer: D

Question No: 69 – (Topic 1)

Which of the following is a virus that can redirect the disk head to read another sector instead of the one in which it resides?

  1. Multipartite virus

  2. Macro virus

  3. Stealth virus

  4. Boot sector virus

Answer: C

Question No: 70 – (Topic 1)

Which of the following items are generally analyzed by Internet filters? Each correct answer represents a complete solution. Choose three.

  1. Content

  2. Certificates

  3. Uniform Resource Locators (URLs)

  4. Network Topology

Answer: A,B,C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE