[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 81-90

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 81 – (Topic 1)

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network. You want to apply an additional network packet filtering device that is intermediate to your enterprise#39;s internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

  1. Border network area

  2. Autonomous system area (AS)

  3. Demilitarized zone (DMZ)

  4. Site network area

Answer: A

Question No: 82 – (Topic 1)

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide?

Each correct answer represents a complete solution. Choose two.

  1. DDoS attack

  2. IP spoofing attack

  3. MAC spoofing

  4. DNS cache poisoning

Answer: B,C

Question No: 83 – (Topic 1)

Which of the following processes is described in the statement below?

quot;It is a process of developing an approximation of the costs of the resources needed to complete project activities.quot;

  1. Cost Control

  2. Cost Budgeting

  3. Activity Resource Estimating

  4. Cost Estimating

Answer: D

Question No: 84 – (Topic 1)

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

  1. Application layer

  2. Transport Layer

  3. Link layer

  4. Internet layer

Answer: C

Question No: 85 – (Topic 1)

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

  1. WEP uses the RC4 encryption algorithm.

  2. Automated tools such as AirSnort are available for discovering WEP keys.

  3. It provides better security than the Wi-Fi Protected Access protocol.

  4. The Initialization Vector (IV) field of WEP is only 24 bits long.

Answer: A,B,D

Question No: 86 – (Topic 1)

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company.

Rick suspects that someone is sending the information through email. He checks the

emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Linguistic steganography

  2. Text Semagrams

  3. Technical steganography

  4. Perceptual masking

Answer: A,B

Question No: 87 – (Topic 1)

IDS systems can be classified in many different ways. Which of the following is not a way that IDS systems are commonly classified?

  1. Latent

  2. Network Based

  3. Passive

  4. Active

  5. Host Based

Answer: A

Question No: 88 – (Topic 1)

Which of the following terms describes the statement given below?

quot;It refers to a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects, and goals. This set encompasses a wide scope of activities, and these include planning, allocating, setting goals, delegation, analysis of time spent, monitoring, organizing, scheduling, and prioritizing.quot;

  1. Time Management

  2. Digital Rights Management

  3. Perception Management

  4. Change Management

Answer: A

Question No: 89 – (Topic 1)

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

  1. Containment

  2. Eradication

  3. Identification

  4. Preparation

Answer: D

Question No: 90 – (Topic 1)

Which of the following are types of social engineering attacks? Each correct answer represents a complete solution. Choose two.

  1. An unauthorized person calls a user and pretends to be a system administrator in order to get the user#39;s password.

  2. An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.

  3. An unauthorized person modifies packet headers by using someone else#39;s IP address to hide his identity.

  4. An unauthorized person gains entrance to the building where the company#39;s database server resides and accesses the server by pretending to be an employee.

Answer: A,D

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE