Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC GSLC Actual Questions

Page: 20 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 77

Which of the following tools can be used to perform polymorphic shell code attacks?

Options:

A.

ADMutate

B.

TrueCrypt

C.

Fragroute

D.

Mendax

Question 78

You work as a Network Administrator in a company. The NIDS is implemented on the network. You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

Options:

A.

Half duplex

B.

Promiscuous

C.

Full Duplex

D.

Audit mode

Question 79

Which of the following is a cryptographic approach employed by many cryptographic algorithms and cryptosystems?

Options:

A.

Symmetric-key cryptography

B.

Public-key cryptography

C.

Asymmetric-key cryptography

D.

Quantum cryptography

Question 80

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

Options:

A.

An example of IP spoofing.

B.

A backdoor the intruder created so that he can re-enter the network.

C.

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

D.

An example of privilege escalation.

Page: 20 / 21
Total 567 questions