[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GSLC Dumps with VCE and PDF 351-360

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Leadership Certification (GSLC)

Question No: 351 – (Topic 3)

You work as a Network Administrator for Perfect Labs Inc. The company has a TCP/IP- based network, which is connected to the Internet. You want to provide Internet access to users. You are concerned about virus threats and want to protect the network against potential virus attacks from the Internet.

Which of the following steps will you take to minimize potential virus attacks?

  1. Install a virus protection program on each workstation.

  2. Run SCANDISK on each workstation.

  3. Configure a firewall in the network.

  4. Install a proxy server in the network.

Answer: A

Question No: 352 – (Topic 3)

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. ARP spoofing

  2. Replay attack

  3. Rainbow attack

  4. DoS attack

Answer: D

Question No: 353 – (Topic 3)

Internet Protocol Security (IPSec) provides data protection during network communication. Which of the following tasks can be performed by IPSec?

Each correct answer represents a complete solution. Choose all that apply.

  1. Ensures the integrity of the IP data.

  2. Authenticates the sender of IP data.

  3. Encrypts all data for full confidentiality.

  4. Displays the originating IP addresses.

Answer: A,B,C

Question No: 354 – (Topic 3)

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company#39;s network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

  1. Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

  2. Black box testing simulates an attack from someone who is familiar with the system.

  3. Black box testing simulates an attack from someone who is unfamiliar with the system.

  4. Black box testing assumes no prior knowledge of the infrastructure to be tested.

Answer: C,D

Question No: 355 – (Topic 3)

Which of the following viruses infects multiple targets?

  1. Macro virus

  2. Multipartite virus

  3. Polymorphic virus

  4. Stealth virus

Answer: B

Question No: 356 – (Topic 3)

According to the security requirements given in case study, which of the following security method should you implement to provide data security between NSILegal and NSIHR?

(Click the Exhibit button on the toolbar to see the case study.)

  1. IPSec with ESP

  2. EFS

  3. IPSec with AH

  4. Group Policies for shared folders

Answer: A

Question No: 357 – (Topic 3)

Which of the following is the process of rewriting source and destination addresses of IP packets as they pass through a router or firewall?

  1. NAT

  2. Supernetting

  3. SNAT

  4. PAT

Answer: C

Question No: 358 – (Topic 3)

You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?

  1. Mitigation

  2. Acceptance

  3. Exploiting

  4. Sharing

Answer: D

Question No: 359 – (Topic 3)

What is the major difference between a worm and a Trojan horse?

  1. A worm is a form of malicious program, while a Trojan horse is a utility.

  2. A Trojan horse is a malicious program, while a worm is an anti-virus software.

  3. A worm is self replicating, while a Trojan horse is not.

  4. A worm spreads via e-mail, while a Trojan horse does not.

Answer: C

Question No: 360 CORRECT TEXT – (Topic 3)

Fill in the blank with the appropriate term.

is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Answer: Promiscuous mode

100% Ensurepass Free Download!
Download Free Demo:GSLC Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GSLC Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.