Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

GSLC Sample Questions Answers

Questions 4

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.

Acceptance

B.

Transference

C.

Mitigation

D.

Avoidance

Buy Now
Questions 5

Which of the following terms describes the statement given below?

"It refers to a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects, and goals. This set encompasses a wide scope of activities, and these include planning, allocating, setting goals, delegation, analysis of time spent, monitoring, organizing, scheduling, and prioritizing."

Options:

A.

Time Management

B.

Digital Rights Management

C.

Perception Management

D.

Change Management

Buy Now
Questions 6

Fill in the blank with the appropriate term.

NOTE. Do not use abbreviation.

________ is a configurable client identification that allows a client to communicate with a particular base station.

Options:

Buy Now
Questions 7

What is the term used to describe the cost of the solution after the solution has been implemented in production by a vendor?

Options:

A.

Total cost of ownership

B.

Total ownership costing

C.

Sustainability fees

D.

Lifecycle maintenance fees

Buy Now
Questions 8

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Strong encryption

B.

Fiber-optic cable

C.

Firewall

D.

Strong password

Buy Now
Questions 9

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

Buy Now
Questions 10

Which of the following statements correctly defines a script kiddie?

Options:

A.

He is an individual who uses hacking programs developed by others to attack information systems and spoil websites.

B.

He is an individual who is an expert in various computer fields such as operating systems, networking, hardware, software, etc. and enjoys the mental challenge of decoding computer programs, solving network vulnerabilities and security threats, etc.

C.

He is an individual who breaks communication systems to perform hacking.

D.

He is an individual who has lost respect and integrity as an employee in any organization.

Buy Now
Questions 11

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.

File integrity auditing

B.

Reconnaissance

C.

Spoofing

D.

Shoulder surfing

Buy Now
Questions 12

You are responsible for network security at a defense contractor. You are very concerned about sensitive data not getting out of your network. You have specific concerns about employees or contractors sending out files via FTP, or even spyware sending out data. You have blocked and monitored ports (as many as you can) on your firewall, and of course, run an anti spyware package.

Which of the following is another step you should take in preventing sensitive data from being sent out of your network without authorization?

Options:

A.

Implement an IDS.

B.

Utilize a DMZ firewall.

C.

Block all employees from emailing outside your network.

D.

Employ network wide anti virus.

Buy Now
Questions 13

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 14

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy?

Options:

A.

Create a GPO.

Configure Audit Object Access.

Attach the GPO to the domain.

B.

Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file.

C.

Enable debug logging on the DNS server.

D.

Create a new OU.

Move the DNS server account to the OU.

Create a GPO.

Configure Audit Logon events.

Attach the GPO to the OU.

Buy Now
Questions 15

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Buy Now
Questions 16

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

Options:

A.

Your public key

B.

The recipient's private key

C.

The recipient's public key

D.

Your private key

Buy Now
Questions 17

Which of the following encryption algorithms is applied in the PGP encryption system?

Options:

A.

TDE

B.

Triple DES

C.

Blowfish

D.

IDEA

Buy Now
Questions 18

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of two Windows 2003 member servers and 500 Windows XP Professional client computers. The member servers are working as file servers. All the member servers are located in an OU named MEMSERV. Mark wants to test IPSec interoperability on the network. For this purpose, he creates a GPO named EXP. In the EXP GPO, he creates an IPSec policy named IPTEST. The IPTEST policy contains a rule that specifies the use of Encapsulating Security Payload (ESP) with null encryption. The IPTEST policy is applied to the member servers by linking the EXP GPO to the MEMSERV OU. After testing the IPSec interoperability, Mark wants to ensure that the member servers no longer use the IPTEST policy. What will he do to accomplish the task?

Options:

A.

Run the REMOVEPOL command on all the member servers.

B.

Unassign the IPTEST policy in the EXP Group Policy object.

C.

Delete the IPTEST policy in the EXP Group Policy object.

D.

Reset the IPTEST policy in the EXP Group Policy object.

Buy Now
Questions 19

Which of the following characteristics are related to biometrics?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Psychological

B.

Biological

C.

Physiological

D.

Behavioral

Buy Now
Questions 20

Which of the following is responsible for assuring the quality of the deliverables in a project?

Options:

A.

Quality assurance (QA) manager

B.

Quality control (QC) manager

C.

Stakeholder

D.

Project manager

Buy Now
Questions 21

PsPasswd is a tool used by network administrators to change an account password on the local or remote system. Which of the following are the command syntaxes used by the PsPasswd tool?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

-t

B.

-u

C.

username

D.

NewPassword

Buy Now
Questions 22

Your company network has been infected with a virus. You have cleaned all PCs, workstations, and servers. However your network still keeps getting re-infected with the same virus. Which of the following could NOT be a cause for this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

The virus is on UPS devices.

B.

Users are downloading the virus from emails.

C.

The virus is on printers.

D.

The virus has infected your network interface cards.

E.

Users have the virus on portable media such as a USB drive.

Buy Now
Questions 23

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.

Examining your firewall logs

B.

Examining your antivirus logs

C.

Examining your domain controller server logs

D.

Examining your DNS Server logs

Buy Now
Questions 24

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk transfer

B.

Risk acceptance

C.

Risk avoidance

D.

Risk mitigation

Buy Now
Questions 25

David works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a print server with two hard disks as basic disks, and 120 Windows XP Professional client computers. Users complain that printing is slow. To improve the printing performance, David wants to create a dynamic volume. Which of the following dynamic volumes will he create to enhance the performance?

Options:

A.

Striped volume

B.

Spanned volume

C.

RAID-5 volume

D.

Mirrored volume

Buy Now
Questions 26

Which of the following attributes is a tool that does not aid the project manager in quality planning?

Options:

A.

Benchmarking practices

B.

Design of experiments

C.

Media selection

D.

Benefit of analysis

Buy Now
Questions 27

Which of the following penetration testing phases involves reconnaissance or data gathering?

Options:

A.

Attack phase

B.

Post-attack phase

C.

Pre-attack phase

D.

Out-attack phase

Buy Now
Questions 28

Which of the following statements about reconnaissance is true?

Options:

A.

It is a computer that is used to attract potential intruders or attackers.

B.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

C.

It describes an attempt to transfer DNS zone data.

D.

It is also known as half-open scanning.

Buy Now
Questions 29

PassGuide Research and Training Center is developing its new network model. Which of the following protocols should be implemented in the new network? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

Options:

A.

IPX/SPX

B.

NetBEUI

C.

TCP/IP

D.

AppleTalk

Buy Now
Questions 30

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

• Network diagrams of the we-are-secure infrastructure

• Source code of the security tools

• IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:

A.

Blackbox

B.

Alpha testing

C.

Whitebox

D.

Graybox

Buy Now
Questions 31

You are the project manager of the NJJ project. Your enterprise environmental factors require that you establish certain risk management rules regarding low risks within your project. What is the best policy for risks with low probability and low impact in the project management?

Options:

A.

These risks should be placed in the risk register.

B.

These risks should be identified, but dismissed.

C.

These risks should be accepted.

D.

These risks should be placed on a watchlist for future monitoring.

Buy Now
Questions 32

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Options:

A.

Mandatory Access Control (MAC)

B.

Access control entry (ACE)

C.

Mandatory Integrity Control (MIC)

D.

Security Identifier (SID)

Buy Now
Questions 33

Which of the following types of authentication is generally used for public Internet Web sites?

Options:

A.

Anonymous authentication

B.

Integrated Windows authentication

C.

Basic authentication

D.

Digest authentication

Buy Now
Questions 34

Which of the following types of attacks cannot be prevented by a firewall?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ping flood attack

B.

Phishing attack

C.

Shoulder surfing attack

D.

URL obfuscation attack

Buy Now
Questions 35

Which method is used to configure several disk drives into a logical disk drive and provides faulttolerance, redundancy, lower latency, and higher bandwidth for read/write operations?

Options:

A.

DRM

B.

DAC

C.

RAID

D.

MAC

Buy Now
Questions 36

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain based network. The network contains four Windows Server 2008 member servers with different roles and 120 Windows Vista client computers. Mark has implemented a Streaming Media Services server on the network. Users complain that they are unable to view the contents when using their Windows Media Players. Mark investigates and finds that the firewall only allows ports 80 and 443 for traffic. Mark wants to ensure that the users can view the contents. What will Mark to do to accomplish the task?

Options:

A.

Configure firewall to allow port 110

B.

Re-install Windows Media player on the users' computers

C.

Configure firewall to allow port 25

D.

Enable HTTP Streaming

Buy Now
Questions 37

You are a Web Administrator of Millennium Inc. The company has hosted its Web site within its network. The management wants the company's vendors to be able to connect to the corporate site from their locations through the Internet. As a public network is involved in this process, you are concerned about the security of data transmitted between the vendors and the corporate site. Which of the following can help you?

Options:

A.

Smart card

B.

EAP

C.

VPN

D.

WEP

Buy Now
Questions 38

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Data classification

C.

Vulnerability assessments

D.

Data encryption

Buy Now
Questions 39

Which of the following RAID standards distributes data across multiple disks in a way that gives improved speed at any given instant?

Options:

A.

RAID 01

B.

RAID 3/4

C.

RAID 1

D.

RAID 0

Buy Now
Questions 40

You are responsible for the security computers in college labs. Since a number of students have significant computer skills, you wish to make security impossible to breach through normal operating system based means. Furthermore, you want to have the security require a password that must be entered before the operating system even loads. What will you do to accomplish the task?

Options:

A.

Implement biometric security.

B.

Implement bios security that prevents the system from loading if the correct password is not entered.

C.

Implement an operating system password that prevents the system from loading if the correct password is not entered.

D.

Implement hard drive encryption with a password tied into the operating system password.

Buy Now
Questions 41

Which of the following DNS servers provides fault tolerance, load distribution, and easier remote name resolution for the primary DNS server?

Options:

A.

Forwarding server

B.

Root server

C.

Caching-only server

D.

Slave server

Buy Now
Questions 42

Which of the following is a part of a company's network that lies in between the Internet and a private network?

Options:

A.

DNS caching-only server

B.

Firewall

C.

Demilitarized Zone (DMZ)

D.

Stub Zone

Buy Now
Questions 43

Which of the following functions can you use to mitigate a command injection attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

escapeshellcmd()

B.

escapeshellarg()

C.

htmlentities()

D.

strip_tags()

Buy Now
Questions 44

You work as a technician for Tech Perfect Inc. A user named Rick calls you. He wants to configure a wireless network for his small office. He wants to adopt a wireless technology that supports high data transfer speed. Which of the following technologies will you suggest?

Options:

A.

802.11b

B.

Infrared

C.

Bluetooth

D.

802.11

Buy Now
Questions 45

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True positive

B.

True negative

C.

False negative

D.

False positive

Buy Now
Questions 46

Your customer wants the fastest wireless possible in his home. Which of the following would you recommend?

Options:

A.

802.11 wireless

B.

Satellite

C.

Bluetooth

D.

3G Cellular

Buy Now
Questions 47

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

Options:

A.

Public-key cryptography

B.

Steganography

C.

RSA algorithm

D.

Encryption

Buy Now
Questions 48

A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it'll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?

Options:

A.

Add the identified risk to the issues log.

B.

Add the identified risk to a quality control management control chart.

C.

Add the identified risk to the low-level risk watchlist.

D.

Add the identified risk to the risk register.

Buy Now
Questions 49

Which of the following encryption modes are possible in WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

128 bit encryption

B.

256 bit encryption

C.

40 bit encryption

D.

No encryption

Buy Now
Questions 50

Which of the following statements about a certification authority (CA) is true?

Options:

A.

It is a non-profit organization that sets security standards for e-commerce.

B.

It issues physical certificates that confirm the identity of entities.

C.

It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

D.

It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

Buy Now
Questions 51

Which of the following is used to identify a particular 802.11 wireless LAN?

Options:

A.

Basic Service Set (BSS)

B.

Basic Service Set Identifier (BSSID)

C.

Independent Basic Service Set (IBSS)

D.

Service Set Identifier (SSID)

Buy Now
Questions 52

Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPSec

B.

Symmetric

C.

Secret

D.

Asymmetric

Buy Now
Questions 53

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

Options:

A.

VPN

B.

Intranet

C.

Extranet

D.

WEP

Buy Now
Questions 54

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

Options:

A.

Black-box testing

B.

White-box testing

C.

Unit testing

D.

Gray-box testing

Buy Now
Questions 55

Which of the following statements about Secure Shell (SSH) are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is the core routing protocol of the Internet.

B.

It was designed as a replacement for TELNET and other insecure shells.

C.

It is a network protocol used primarily on Linux and Unix based systems.

D.

It allows data to be exchanged using a secure channel between two networked devices.

Buy Now
Questions 56

In the image of the Screened Host Firewall Architecture given below, select the element that is commonly known as the access router.

Options:

A.

Buy Now
Questions 57

John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

Social engineering

B.

Replay attack

C.

Trojan horse

D.

DoS

Buy Now
Questions 58

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites.

Which of the following would protect against this?

Options:

A.

Three factor authentication

B.

Two factor authentication

C.

Mutual authentication

D.

MAC

Buy Now
Questions 59

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Business continuity plan

C.

Contingency plan

D.

Continuity of Operations Plan

Buy Now
Questions 60

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.

The distortion technique

B.

The substitution technique

C.

The cover generation technique

D.

The spread spectrum technique

Buy Now
Questions 61

You work as Network and Security Manager for PassGuide Inc. The management of the company is quite concerned about the security of the network. The management has assigned this task to you to improve the security. Which of the following access methods will you use if the method is to be primarily based on pre-established access, and users cannot change it?

Options:

A.

PAC

B.

OrBAC

C.

MAC

D.

RBAC

Buy Now
Questions 62

What are the steps related to the vulnerability management program?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Baseline the Environment

B.

Maintain and Monitor

C.

Organization Vulnerability

D.

Define Policy

Buy Now
Questions 63

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Backup

B.

Symmetric encryption

C.

Firewall

D.

Antivirus

Buy Now
Questions 64

You work as an Administrator for Bluesky Inc. The company has 145 Windows XP Professional client computers and eighty Windows 2003 Server computers. You want to install a security layer of WAP specifically designed for a wireless environment. You also want to ensure that the security layer provides privacy, data integrity, and authentication for client-server communications over a wireless network. Moreover, you want a client and server to be authenticated so that wireless transactions remain secure and the connection is encrypted. Which of the following options will you use to accomplish the task?

Options:

A.

Wireless Transport Layer Security (WTLS)

B.

Recovery Console

C.

Wired Equivalent Privacy (WEP)

D.

Virtual Private Network (VPN)

Buy Now
Questions 65

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Integrity

C.

Non-repudiation

D.

Confidentiality

Buy Now
Questions 66

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.

ESP is always used in combination with Authentication Header (AH).

B.

ESP can encrypt data and verify data integrity.

C.

ESP is never used in combination with Authentication Header (AH).

D.

ESP only verifies data integrity.

Buy Now
Questions 67

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Session encryption

B.

Removing all stored procedures

C.

Input sanitization

D.

Applying strong firewall rules

Buy Now
Questions 68

You have installed Windows Vista Home Premium on your home computer. The computer is connected to the Internet through an ADSL connection. You want to protect yourself from the traps of fraudulent sites. Which of the following features of Internet Explorer 7+ will you use?

Options:

A.

Pop-up blocker

B.

Protected mode

C.

Privacy settings

D.

Phishing filter

Buy Now
Questions 69

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

B.

Remove the SNMP agent or disable the SNMP service.

C.

Monitor the programs running on the server to see whether any new process is running on the server or not.

D.

Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Buy Now
Questions 70

Which of the following applications would be considered a data warehousing application?

Options:

A.

Golf score tracking

B.

Badge reader

C.

Fraud detection

D.

eCommerce site

Buy Now
Questions 71

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Stealth

B.

Snow

C.

Blindside

D.

ImageHide

Buy Now
Questions 72

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

Options:

A.

Armored virus

B.

Stealth virus

C.

Multipartite virus

D.

Polymorphic virus

Buy Now
Questions 73

You are the program manager for your organization. You have proposed a program that will cost $750,000 and will last for four years. Management is concerned with the cost of the program in relation to the return your program will bring. If the rate of return is six percent what is the minimum value your project should return in four years based on the investment of the program?

Options:

A.

$795,000

B.

$750,001

C.

$946,857

D.

$750,000

Buy Now
Questions 74

Which of the following processes is NOT a part of the Project Procurement Management Knowledge Area?

Options:

A.

Develop Project Management Plan

B.

Request Seller Responses

C.

Contract Administration

D.

Plan Purchases and Acquisitions

Buy Now
Questions 75

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Steg-Only Attack

B.

Stegdetect Attack

C.

Active Attacks

D.

Chosen-Stego Attack

Buy Now
Questions 76

Fill in the blank with the appropriate type of router.

A ______ router performs packet-filtering and is used as a firewall.

Options:

Buy Now
Questions 77

Fill in the blank with the appropriate word.

A_______ is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems.

Options:

Buy Now
Questions 78

An organization has a standardized change management plan that all project managers must adhere to. A project manager has worked with the Change Control Board in his organization to approve a change to project scope. What should the standardized change management plan require the project manager to do with the approved scope change?

Options:

A.

Perform risk assessment on the new change.

B.

Communicate the change to the vendor.

C.

Create a cost estimate for the change.

D.

Update the WBS.

Buy Now
Questions 79

Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?

Options:

A.

WEP

B.

WAP

C.

L2TP

D.

IPSec

Buy Now
Questions 80

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Corrupted or missing files.

B.

Sudden reduction in system resources.

C.

Faster read/write access of the CD-ROM drive.

D.

Unclear monitor display.

Buy Now
Questions 81

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domain-based network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him. Which of the following steps will you take to accomplish the task?

Options:

A.

Remove domain names of such emails from the Safe Sender's list.

B.

Configure phishing filter in Internet Explorer 7.0.

Configure it to filter all phishing mails.

C.

Configure phishing filter in Windows Mail.

Configure it to move such mails to the Junk Mail folder.

D.

Add domain names of such emails in the Block Sender's list.

Buy Now
Questions 82

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

Options:

A.

Automated penetration testing

B.

Code review

C.

Manual penetration testing

D.

Vulnerability scanning

Buy Now
Questions 83

Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open issues in the project and how the resolution of the issues may lead to additional project changes. On what document are Tomas and the stakeholders working in this scenario?

Options:

A.

Change management plan

B.

Communications management plan

C.

Issue log

D.

Risk management plan

Buy Now
Questions 84

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Internet Key Exchange

B.

Encapsulating Security Payload

C.

Authentication Header

D.

Skinny Client Control Protocol

Buy Now
Questions 85

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Options:

A.

Single Sign-On

B.

Dynamic

C.

One-time password

D.

Kerberos

Buy Now
Questions 86

Which of the following statements is true about the difference between worms and Trojan horses?

Options:

A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms replicate themselves while Trojan horses do not.

D.

Worms can be distributed through emails while Trojan horses cannot.

Buy Now
Questions 87

You are responsible for security on your network. One particular concern is the theft of sensitive data. You want to make sure that end users do not (purposefully or accidentally) take data off the premises. Which of the following should you be concerned about?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cell Phones

B.

Individual scanners

C.

USB Drives

D.

Individual printers

Buy Now
Questions 88

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

Snort

B.

RealSecure

C.

Tripwire

D.

StealthWatch

Buy Now
Questions 89

IDS systems can be classified in many different ways. Which of the following is not a way that IDS systems are commonly classified?

Options:

A.

Latent

B.

Network Based

C.

Passive

D.

Active

E.

Host Based

Buy Now
Questions 90

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domainbased network. The network contains five Windows 2003 member servers and 300 Windows XP Professional client computers. Mark is setting up a wireless network for the company. He is planning to implement 802.1x authentication for this new wireless network. Mark is not planning to use a public key infrastructure (PKI) and certificates for authentication. Mark also wants an encrypted authentication channel and a fast reconnect using cached session keys. Which of the following authentication methods will he use to accomplish the task?

Options:

A.

Protected EAP (PEAP)

B.

EAP-Transport Layer Security (EAP-TLS)

C.

Shared Key authentication

D.

Digest authentication

Buy Now
Questions 91

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted; however, you want the least difficulty in the encryption process. Which of the following should you choose?

Options:

A.

DES

B.

MD5

C.

Asymmetric Encryption

D.

Symmetric Encryption

Buy Now
Questions 92

You are responsible for securing the network at a law firm. They are particularly interested in ensuring that sensitive documents are not disclosed to outside parties. In securing the printers and scanners, which of the following statements are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Wireless printers can be compromised by a hacker.

B.

Ghosting of documents is the only real security issue with scanners and copiers.

C.

Immediately after an image has been scanned you can 'ghost' that document/image.

D.

Secure hard drives in printers, since they can store copies of documents.

E.

Printers only have temporary data storage, so it is not possible to get data from a printer after a document is printed.

Buy Now
Questions 93

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSHGuard

B.

portsentry

C.

OpenSSL

D.

nmap

E.

Fail2Ban

Buy Now
Questions 94

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you take to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Implement the IEEE 802.1X authentication for the wireless network.

B.

Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

C.

Implement the open system authentication for the wireless network.

D.

Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

E.

Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

Buy Now
Questions 95

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

Options:

A.

Macro virus

B.

Stealth virus

C.

E-mail virus

D.

Polymorphic virus

Buy Now
Questions 96

You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?

Options:

A.

Trace back that traffic and find its origin.

B.

Check the exceptions in the firewall and unselect that port exception.

C.

Perform a virus scan to find the virus responsible for this traffic.

D.

Shut down the service that connects to that port.

Buy Now
Questions 97

Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources and information?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Training and awareness

B.

Employee registration and accounting

C.

Network authentication

D.

Encryption

E.

Disaster preparedness and recovery plans

Buy Now
Questions 98

In which of the following malicious hacking steps does email tracking come under?

Options:

A.

Maintaining Access

B.

Gaining access

C.

Reconnaissance

D.

Scanning

Buy Now
Questions 99

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSHGuard

B.

nmap

C.

Fail2Ban

D.

portsentry

E.

OpenSSL

Buy Now
Questions 100

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

Options:

A.

Project Integration Management

B.

Project Time Management

C.

Project Scope Management

D.

Project Risk Management

Buy Now
Questions 101

Rick works as a project manager for a construction project. He is documenting products, services, and results requirements and identifying potential sellers. In which of the following Knowledge Areas is he working on?

Options:

A.

Project Quality Management

B.

Project Procurement Management

C.

Project Initiation Management

D.

Project Cost Management

Buy Now
Questions 102

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

Options:

A.

ARP spoofing

B.

Replay attack

C.

Rainbow attack

D.

DoS attack

Buy Now
Questions 103

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated.

In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections.

Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

Options:

A.

The laptop users will be able to use smart cards for getting authenticated.

B.

None of the tasks will be accomplished.

C.

Both tasks will be accomplished.

D.

The wireless network communication will be secured.

Buy Now
Questions 104

John works as a Security Administrator for Enet Inc. He uses a 4 digits personal identification number (PIN) to access the computer and a token is used to perform offline checking whether John has entered the correct PIN or not. Which of the following attacks is possible on John's computer?

Options:

A.

Replay

B.

Smurf

C.

Man-In-The-Middle

D.

Brute force

Buy Now
Questions 105

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Safeguard

D.

Exposure Factor (EF)

Buy Now
Questions 106

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

Options:

A.

John the Ripper

B.

Cheops-ng

C.

AiroPeek

D.

Sam Spade

Buy Now
Questions 107

In which of the following techniques does an attacker change the address of the phishing site in such a manner that it can bypass filters or other application defenses that have been put in place to block specific IP addresses?

Options:

A.

Dumpster diving

B.

Reverse social engineering

C.

Shoulder surfing

D.

URL obfuscation

Buy Now
Questions 108

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

Options:

A.

Use an SSL certificate.

B.

Use EFS.

C.

Use a proxy server.

D.

Use a firewall.

Buy Now
Questions 109

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is consists of various protocols present in each layer.

B.

It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

C.

It is generally described as having five abstraction layers.

D.

It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

Buy Now
Questions 110

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

Options:

A.

Application-level gateway

B.

Proxy server

C.

Firewall

D.

DMZ

Buy Now
Questions 111

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. All client computers on the network run Windows XP Professional.

You configure a public key infrastructure (PKI) on the network. You configure a root CA and a subordinate CA on the network. For security reasons, you want to take the root CA offline. You are required to configure the CA servers to support for certificate revocation. Choose the steps you will require to accomplish the task.

Options:

A.

Buy Now
Questions 112

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

Options:

A.

Cost

B.

Schedule

C.

Contract

D.

Resources

Buy Now
Questions 113

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

Options:

A.

Cyber squatting

B.

Cyber Stalking

C.

Spoofing

D.

Man-in-the-middle attack

Buy Now
Questions 114

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Stealth

B.

Multipartite

C.

Boot sector

D.

File

Buy Now
Questions 115

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a host-based IDS

B.

Enable verbose logging on the firewall

C.

Install a DMZ firewall

D.

Install a network-based IDS

Buy Now
Questions 116

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Options:

A.

In person attack

B.

Third-party authorization attack

C.

Important user posing attack

D.

Impersonation attack

Buy Now
Questions 117

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Buy Now
Questions 118

You are the project manager of the GYG Project. A new scope change is being considered for your project. You are concerned, however, that the scope change may add costs, risks, and adversely affect the project schedule. What project management process is responsible for evaluating the full effect of a proposed scope change on your project?

Options:

A.

Schedule change control

B.

Scope change control

C.

Integrated change control

D.

Change Control Board approval process

Buy Now
Questions 119

Which of the following tools is used to hide secret data in text files and is based on the concept that spaces and tabs are generally not visible in text viewers and therefore a message can be effectively hidden without affecting the text's visual representation for the casual observer?

Options:

A.

SARA

B.

Snow.exe

C.

Fpipe

D.

Image hide

Buy Now
Questions 120

You work as a Network Administrator in a company. The NIDS is implemented on the network.

You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

Options:

A.

Full Duplex

B.

Audit mode

C.

Half duplex

D.

Promiscuous

Buy Now
Questions 121

Which of the following applications would NOT be considered an OLTP application?

Options:

A.

Fraud detection

B.

Badge reader

C.

eCommerce site

D.

Stock-trading site

Buy Now
Questions 122

A user in your department complains about a slow Internet connection. You monitor the external interface of your company's border router and notice an excessive number of half-open TCP connections. What type of attack is your company currently a victim of?

Options:

A.

TCP SYN flood attack

B.

TCP Hijacking attack

C.

Ping flood

D.

Brute force attack

Buy Now
Questions 123

Which of the following are the benefits of information classification for an organization?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It helps reduce the Total Cost of Ownership (TCO).

D.

It helps identify which protections apply to which information.

Buy Now
Questions 124

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use SMART model

C.

Use OODA loop

D.

Use Information assurance

Buy Now
Questions 125

You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.

The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.

Which of the following types of security attacks do you think it is?

Options:

A.

Social engineering

B.

Man-in-the-middle

C.

Hacking

D.

Spoofing

Buy Now
Questions 126

Which of the following protocols is used for destination and error reporting functions in datagram processing?

Options:

A.

PPP

B.

SRP

C.

NTP

D.

ICMP

Buy Now
Questions 127

Which of the following is used to translate domain names into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide?

Options:

A.

DFSR

B.

DNS

C.

DFS

D.

EFS

Buy Now
Questions 128

Which of the following statements about front door attack is true?

Options:

A.

In this type of attack, the hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses a dictionary of common words to find out the password of a user.

C.

This type of attack is used to sniff passwords or information from a legitimate transaction to be used for the hacker's advantage.

D.

In this type of attack, the hacker has all the correct information to get into a system and does not have to perform any additional task to get that information.

Buy Now
Questions 129

What is another term that can be assigned to the pre-program analysis and research to determine if a program should be initiated?

Options:

A.

Business case creation

B.

Feasibility study creation

C.

Program scope statement definition

D.

Program charter creation

Buy Now
Questions 130

Which of the following is a read-only copy of a zone and obtains its resource records from other name servers?

Options:

A.

Secondary zone

B.

Primary zone

C.

Stub zone

D.

SOA zone

Buy Now
Questions 131

A user has opened a Web site that automatically starts downloading malicious code onto his computer.

What should he do to prevent this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Disable ActiveX Controls

B.

Disable Active Scripting

C.

Implement File Integrity Auditing

D.

Configure Security Logs

Buy Now
Questions 132

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Strong authentication method

B.

Firewall

C.

Strong data encryption during travel

D.

Anti-virus programs

Buy Now
Questions 133

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.

Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The site should force its users to change their passwords from time to time.

B.

The site should use CAPTCHA after a specific number of failed login attempts.

C.

The site should increase the encryption key length of the password.

D.

The site should restrict the number of login attempts to only three times.

Buy Now
Questions 134

Which of the following viruses replaces the boot sector data with its own malicious code?

Options:

A.

Chernobyl

B.

Explore.Zip

C.

MBR

D.

Nimda

Buy Now
Questions 135

Which of the following is the rating for gasoline or oil fires?

Options:

A.

Class C

B.

Class B

C.

Class D

D.

Class A

Buy Now
Questions 136

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

Options:

A.

STP

B.

UDP

C.

TCP

D.

SNMP

Buy Now
Questions 137

You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.

You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.

What is the most likely cause?

Options:

A.

The group policy is not enabled for the domain.

B.

You failed to add the CA certificate to the trusted root certification authorities container.

C.

Certificate enrollment and renewal is not enabled for the group policy.

D.

An enterprise CA is not online.

Buy Now
Questions 138

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

Options:

A.

An example of IP spoofing.

B.

A backdoor the intruder created so that he can re-enter the network.

C.

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

D.

An example of privilege escalation.

Buy Now
Questions 139

In which of the following does an attacker use multiple computers throughout the network that has been previously infected?

Options:

A.

Phishing

B.

DDOS

C.

DOS

D.

Sniffer

Buy Now
Questions 140

Which of the following tools can be used to perform ICMP tunneling?

Each correct answer represents a complete solution. Choose two.

Options:

A.

WinTunnel

B.

Ethereal

C.

Itunnel

D.

Ptunnel

Buy Now
Questions 141

Which firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network?

Options:

A.

Deep packet inspection

B.

Packet hosting

C.

Screened host

D.

Packet filtering

Buy Now
Questions 142

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret

B.

Synchronous

C.

Asymmetric

D.

Symmetric

Buy Now
Questions 143

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

ICMP

B.

SCP protocol

C.

Rootkit

D.

Packet sniffing

Buy Now
Questions 144

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Options:

A.

Network anti-spyware software

B.

Network anti-virus software

C.

Site surveys

D.

Protocol analyzers

Buy Now
Questions 145

Which of the following is not a man-made threat?

Options:

A.

Tidal wave

B.

Vandalism

C.

Terrorism

D.

Theft

Buy Now
Questions 146

Which of the following is a computer file used in an operating system to map hostnames to IP addresses?

Options:

A.

LMHOSTS file

B.

NSCD.CONF file

C.

TMPFS file

D.

HOSTS file

Buy Now
Questions 147

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:

A.

RSA

B.

TripleDES

C.

DES

D.

AES

Buy Now
Questions 148

In which of the following does a project manager assign certain points towards various categories to judge the vendors?

Options:

A.

Project plan

B.

Project analysis

C.

Screening system

D.

Weighting system

Buy Now
Questions 149

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

Options:

A.

I LOVE YOU

B.

Melissa

C.

Klez

D.

Boot sector

Buy Now
Questions 150

Which of the following standards is also known as IEEE 802.11i?

Options:

A.

Wi-Fi Protected Access 2 (WPA2)

B.

Wi-Fi Protected Access (WPA)

C.

Wired Equivalent Privacy (WEP)

D.

Wireless Access Protocol (WAP)

Buy Now
Questions 151

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Code red

B.

Beast

C.

Klez

D.

SQL Slammer

Buy Now
Questions 152

All of the following are the outputs of the Acquire Project Team process except for which one?

Options:

A.

Resource calendars

B.

Enterprise environmental factors

C.

Project staff assignments

D.

Project management plan updates

Buy Now
Questions 153

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

Mac flooding

B.

DNS poisoning

C.

IP spoofing

D.

Man-in-the-middle

Buy Now
Questions 154

Which of the following tools can be used to perform a whois query?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WsPingPro

B.

Traceroute

C.

Sam Spade

D.

SuperScan

Buy Now
Questions 155

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC

B.

DAC

C.

RBAC

D.

MAC

Buy Now
Questions 156

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

Options:

A.

VPN

B.

Extranet

C.

Intranet

D.

WEP

Buy Now
Questions 157

Which of the following port numbers is used by the LDAP protocol when it is secured?

Options:

A.

335

B.

120

C.

442

D.

636

Buy Now
Questions 158

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

F936.28A1.5BCD.DEFA

B.

1011-0011-1010-1110-1100-0001

C.

132.298.1.23

D.

A3-07-B9-E3-BC-F9

Buy Now
Questions 159

Which of the following is the default security level for the Internet zone?

Options:

A.

Medium

B.

High

C.

Low

D.

Medium-Low

Buy Now
Questions 160

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

I LOVE YOU virus

B.

Nimda virus

C.

Chernobyl virus

D.

Melissa virus

Buy Now
Questions 161

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

DNS zone transfer

B.

SNMP enumeration

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Questions 162

Fill in the blank with the appropriate type of router.

A _________ router performs packet-filtering and is used as a firewall.

Options:

Buy Now
Questions 163

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks except for which one?

Options:

A.

Implement the IPP printing capability.

B.

Conduct frequent scans for server vulnerabilities.

C.

Install the upgrades of Microsoft service packs.

D.

Implement effective firewalls.

Buy Now
Questions 164

Which of the following encrypts its code differently with each infection or generation of infections?

Options:

A.

Boot sector virus

B.

Stealth virus

C.

Polymorphic virus

D.

Macro virus

Buy Now
Questions 165

Which type of repudiation states that the creator of the message denies ever creating the message even after creating it?

Options:

A.

Repudiation of submission

B.

Repudiation of creation

C.

Repudiation of receipt

D.

Repudiation of origin

Buy Now
Questions 166

In Which of the following types of white box testing are the test cases designed based on data flow within the code?

Options:

A.

Data flow testing

B.

Control flow testing

C.

Path testing

D.

Branch testing

Buy Now
Questions 167

Which of the following is a valid space efficiency of RAID 3?

Options:

A.

1 - 1/n

B.

1/n

C.

1 - 2/n

D.

1

Buy Now
Questions 168

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric encryption

B.

Database encryption

C.

XML encryption

D.

Symmetric encryption

Buy Now
Questions 169

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

Options:

A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

Buy Now
Questions 170

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Sep 15, 2025
Questions: 567
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now GSLC