[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GSLC Dumps with VCE and PDF 221-230

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 221 – (Topic 2)

You have inserted a Trojan on your friend#39;s computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?



  1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

  2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

  3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

Answer: A

Question No: 222 – (Topic 2)

Maria works as a Risk Analysis Manager for Gentech Inc. She starts a new IT project. Which of the following phases of her project development process is most suitable for including risk analysis?

  1. Implementation planning

  2. Project initiation

  3. System construction

  4. Requirements definition

Answer: B

Question No: 223 – (Topic 2)

Which of the following is an entry in an object#39;s discretionary access control list (DACL) that grants permissions to a user or group?

  1. Mandatory Access Control (MAC)

  2. Access control entry (ACE)

  3. Mandatory Integrity Control (MIC)

  4. Security Identifier (SID)

Answer: B

Question No: 224 – (Topic 2)

Which of the following statements are true about SSIDs?

Each correct answer represents a complete solution. Choose all that apply.

  1. All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

  2. SSIDs are case insensitive text strings and have a maximum length of 64 characters.

  3. SSID is used to identify a wireless network.

  4. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

Answer: A,C,D

Question No: 225 – (Topic 2)

Your customer wants the fastest wireless possible in his home. Which of the following would you recommend?

  1. 802.11 wireless

  2. Satellite

  3. Bluetooth

  4. 3G Cellular

Answer: A

Question No: 226 – (Topic 2)

A management workstation collects and connects events from multiple IPS sensors in the network.

Which protocol is used in this process?

  1. SNMP

  2. SCCP

  3. SRTP

  4. SDEE

Answer: D

Question No: 227 – (Topic 2)

Which of the following DNS servers provides fault tolerance, load distribution, and easier remote name resolution for the primary DNS server?

  1. Forwarding server

  2. Root server

  3. Caching-only server

  4. Slave server

Answer: D

Question No: 228 – (Topic 2)

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

  1. Broadcast storm

  2. DoS attack

  3. Password sniffing

  4. IP spoofing

Answer: C,D

Question No: 229 – (Topic 2)

Which of the following is used to authenticate asymmetric keys?

  1. MAC Address

  2. Digital signature

  3. Demilitarized zone (DMZ)

  4. Password

Answer: B

Question No: 230 – (Topic 2)

You work as a Security manager for Caterxiss Inc. The headquarters of your company is connected to the branch office in another state and a service partner in the same state. The network of the company is being attacked from the connected networks. You decide to analyze and then prevent the corporate headquarters network from these attacks using a Snort IDS.

What is the most appropriate spot on the network where you should set up an Intrusion detection system (IDS)?

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE


Answer: A

100% Ensurepass Free Download!
Download Free Demo:GSLC Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GSLC Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.