GIAC GSLC Exam Practice Questions (P. 5)
- Full Access (566 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the
We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
send
light_mode
delete
Question #42
Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?
send
light_mode
delete
Question #43
Which of the following heights of fence deters only casual trespassers?
send
light_mode
delete
Question #44
You work as Network and Security Manager for PassGuide Inc. The management of the company is quite concerned about the security of the network. The management has assigned this task to you to improve the security. Which of the following access methods will you use if the method is to be primarily based on pre-established access, and users cannot change it?
send
light_mode
delete
Question #45
Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?
send
light_mode
delete
Question #46
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
send
light_mode
delete
Question #47
Which of the following protocols does IPsec use to perform various security functions in the network?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AInternet Key Exchange
- BEncapsulating Security Payload
- CAuthentication Header
- DSkinny Client Control Protocol
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #48
You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project.
This is an example of what type of risk response?
This is an example of what type of risk response?
send
light_mode
delete
Question #49
Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open issues in the project and how the resolution of the issues may lead to additional project changes. On what document are Tomas and the stakeholders working in this scenario?
- AChange management plan
- BCommunications management plan
- CIssue log
- DRisk management plan
Correct Answer:
A
A
send
light_mode
delete
Question #50
Which of the following statements is true about the difference between worms and Trojan horses?
- ATrojan horses are a form of malicious codes while worms are not.
- BTrojan horses are harmful to computers while worms are not.
- CWorms replicate themselves while Trojan horses do not.
- DWorms can be distributed through emails while Trojan horses cannot.
Correct Answer:
C
C
send
light_mode
delete
All Pages