Leads4pass > GIAC > GIAC Certifications > GSLC > GSLC Online Practice Questions and Answers

GSLC Online Practice Questions and Answers

Questions 4

You have installed Windows Vista Home Premium on your home computer. The computer is connected to the Internet through an ADSL connection. You want to protect yourself from the traps of fraudulent sites. Which of the following features of Internet Explorer 7+ will you use?

A. Pop-up blocker

B. Protected mode

C. Privacy settings

D. Phishing filter

Buy Now
Questions 5

What do spikes in a power line indicate?

A. Interference superimposed onto the power line

B. Momentary high voltage

C. Prolonged loss of power

D. Momentary low voltage

Buy Now
Questions 6

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique? Each correct answer represents a complete solution. Choose all that apply.

A. SSHGuard

B. portsentry

C. OpenSSL

D. nmap

E. Fail2Ban

Buy Now
Questions 7

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

A. It uses asymmetric key pairs.

B. It uses symmetric key pairs.

C. It provides security using data encryption and digital signature.

D. It is a digital representation of information that identifies users.

Buy Now
Questions 8

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which

of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

A. Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B. Black box testing simulates an attack from someone who is familiar with the system.

C. Black box testing simulates an attack from someone who is unfamiliar with the system.

D. Black box testing assumes no prior knowledge of the infrastructure to be tested.

Buy Now
Questions 9

Which of the following types of attacks cannot be prevented by a firewall? Each correct answer represents a complete solution. Choose all that apply.

A. Ping flood attack

B. Phishing attack

C. Shoulder surfing attack

D. URL obfuscation attack

Buy Now
Questions 10

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

Buy Now
Questions 11

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use the Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret

information?

Each correct answer represents a complete solution. Choose all that apply.

A. Hidden partition

B. Dumb space

C. Slack space

D. Unused sectors

Buy Now
Questions 12

Your project is to implement a new operating system for all of the workstations in your company's network. Every workstation must have the new operating system as part of an organization-wide mandate. Many users are not happy with this decision and are resisting the change. Some of the users are complaining that they do not want the operating system at all. What type of stakeholders are these users?

A. Con stakeholders

B. Customers

C. Negative stakeholders

D. End-users

Buy Now
Questions 13

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

A. The distortion technique

B. The substitution technique

C. The cover generation technique

D. The spread spectrum technique

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership (GSLC)
Last Update: Jan 08, 2025
Questions: 701
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99