New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Full Access GIAC GSLC Tutorials

Page: 13 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 49

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher.

Which of the following techniques will she use to fulfill this requirement?

Options:

A.

DES

B.

AES

C.

PGP

D.

IDEA

Question 50

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

C.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

D.

He should restore his Windows settings.

Question 51

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

portsentry

B.

nmap

C.

scanlogd

D.

libnids

Question 52

Which of the following types of attacks cannot be prevented by a firewall?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ping flood attack

B.

Phishing attack

C.

Shoulder surfing attack

D.

URL obfuscation attack

Page: 13 / 21
Total 567 questions