Certbus > GIAC > GIAC Information Security > GSLC > GSLC Online Practice Questions and Answers

GSLC Online Practice Questions and Answers

Questions 4

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11

wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN.

However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's

security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

A. Configure the authentication type for the wireless LAN to Open system.

B. Install a firewall software on each wireless access point.

C. Configure the authentication type for the wireless LAN to Shared Key.

D. Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

E. Broadcast SSID to connect to the access point (AP).

F. On each client computer, add the SSID for the wireless LAN as the preferred network.

Browse 701 Q&As
Questions 5

Which of the following is used to communicate with an authentication server commonly used in UNIX networks?

A. MS-CHAP

B. IPX/SPX

C. SMTP

D. TACACS

Browse 701 Q&As
Questions 6

Adrian knows the host names of all the computers on his network. He wants to find the IP addresses of these computers. Which of the following TCP/IP utilities can he use to find the IP addresses of these computers? Each correct answer represents a complete solution. Choose two.

A. IPCONFIG

B. PING

C. NETSTAT

D. TRACERT

Browse 701 Q&As
Questions 7

Which of the following are the countermeasures against WEP cracking? Each correct answer represents a part of the solution. Choose all that apply.

A. Changing keys often.

B. Using the longest key supported by hardware.

C. Using a 16 bit SSID.

D. Using a non-obvious key.

Browse 701 Q&As
Questions 8

According to Microsoft's privacy guidelines, which of the following data types includes statistic from aggregate information?

A. Personally Identifiable Information

B. Pseudonymous Data

C. Anonymous Data

D. Sensitive Personally Identifiable Information

Browse 701 Q&As
Questions 9

Which of the following is the rating for gasoline or oil fires?

A. Class C

B. Class B

C. Class D

D. Class A

Browse 701 Q&As
Questions 10

What does noise in a power line indicate?

A. Power degradation that is low and less than normal

B. Interference superimposed onto the power line

C. Momentary high voltage

D. Prolonged loss of power

Browse 701 Q&As
Questions 11

In which of the following malicious hacking steps does email tracking come under?

A. Maintaining Access

B. Gaining access

C. Reconnaissance

D. Scanning

Browse 701 Q&As
Questions 12

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

A. WinSSLMiM

B. httprint

C. ServerMask

D. Whisker

Browse 701 Q&As
Questions 13

Which of the following is used to authenticate asymmetric keys?

A. MAC Address

B. Digital signature

C. Demilitarized zone (DMZ)

D. Password

Browse 701 Q&As
Questions 14

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

A. Broadcast storm

B. DoS attack

C. Password sniffing

D. IP spoofing

Browse 701 Q&As
Questions 15

GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which of the following cryptographic attacks can be used to break both ciphers?

A. Man-in-the-middle attack

B. Known plaintext attack

C. Replay attack

D. Ciphertext only attack

Browse 701 Q&As
Questions 16

Which of the following statements about a certification authority (CA) is true?

A. It is a non-profit organization that sets security standards for e-commerce.

B. It issues physical certificates that confirm the identity of entities.

C. It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

D. It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

Browse 701 Q&As
Questions 17

Which of the following relies on a physical characteristic of the user to verify his identity?

A. Kerberos v5

B. Social Engineering

C. CHAP

D. Biometrics

Browse 701 Q&As
Questions 18

You work as a technician for Tech Perfect Inc. A user named Rick calls you. He wants to configure a wireless network for his small office. He wants to adopt a wireless technology that supports high data transfer speed. Which of the following technologies will you suggest?

A. 802.11b

B. Infrared

C. Bluetooth

D. 802.11

Browse 701 Q&As
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Apr 28, 2024
Questions: 701 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99