GIAC GSLC Exam Practice Questions (P. 4)
- Full Access (566 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Which of the following is used to communicate with an authentication server commonly used in UNIX networks?
send
light_mode
delete
Question #32
Which of the following backup sites takes the longest recovery time?
send
light_mode
delete
Question #33
Which of the following features of IE prevent users from a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
send
light_mode
delete
Question #34
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
- AFTP server
- BVPN
- CMicrosoft Internet Information Server (IIS)
- DCertificate server
Correct Answer:
D
D
send
light_mode
delete
Question #35
You have installed Windows Vista Home Premium on your home computer. The computer is connected to the Internet through an ADSL connection. You want to protect yourself from the traps of fraudulent sites. Which of the following features of Internet Explorer 7+ will you use?
send
light_mode
delete
Question #36
You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?
send
light_mode
delete
Question #37
Which of the following federal laws are related to hacking activities?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
send
light_mode
delete
Question #38
You work as an Administrator for Bluesky Inc. The company has 145 Windows XP Professional client computers and eighty Windows 2003 Server computers.
You want to install a security layer of WAP specifically designed for a wireless environment. You also want to ensure that the security layer provides privacy, data integrity, and authentication for client-server communications over a wireless network. Moreover, you want a client and server to be authenticated so that wireless transactions remain secure and the connection is encrypted. Which of the following options will you use to accomplish the task?
You want to install a security layer of WAP specifically designed for a wireless environment. You also want to ensure that the security layer provides privacy, data integrity, and authentication for client-server communications over a wireless network. Moreover, you want a client and server to be authenticated so that wireless transactions remain secure and the connection is encrypted. Which of the following options will you use to accomplish the task?
- AWireless Transport Layer Security (WTLS)
- BRecovery Console
- CWired Equivalent Privacy (WEP)
- DVirtual Private Network (VPN)
Correct Answer:
A
A
send
light_mode
delete
Question #39
You work as a Network Administrator for Infosec Inc. The company has a Windows 2003-based server. You have installed McAfee antivirus as well as anti- spyware software on the server. One day, you come to know that not only have the security applications running on the server (including software firewalls, anti- virus, and anti-spyware) been disabled, but the anti-virus and anti-spyware definitions have also been deleted. You suspect that this is due to malware infection.
Which of the following types of malware is the most likely cause of the issue?
Which of the following types of malware is the most likely cause of the issue?
send
light_mode
delete
Question #40
John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We- are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:
✑ HTTP
✑ SSL
✑ SSH
✑ IPSec
Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?
Each correct answer represents a complete solution. Choose all that apply.
✑ HTTP
✑ SSL
✑ SSH
✑ IPSec
Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
All Pages