Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC GSLC Online Access

Page: 14 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 53

You are responsible for the security computers in college labs. Since a number of students have significant computer skills, you wish to make security impossible to breach through normal operating system based means. Furthermore, you want to have the security require a password that must be entered before the operating system even loads. What will you do to accomplish the task?

Options:

A.

Implement biometric security.

B.

Implement bios security that prevents the system from loading if the correct password is not entered.

C.

Implement an operating system password that prevents the system from loading if the correct password is not entered.

D.

Implement hard drive encryption with a password tied into the operating system password.

Question 54

Which of the following malware spread through the Internet and caused a large DoS attack in 1988?

Options:

A.

LoveLetter worm

B.

Klez worm

C.

Morris worm

D.

SQL slammer worm

Question 55

Which method is used to configure several disk drives into a logical disk drive and provides faulttolerance, redundancy, lower latency, and higher bandwidth for read/write operations?

Options:

A.

DRM

B.

DAC

C.

RAID

D.

MAC

Question 56

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Reconnaissance

B.

Maintaining access

C.

Covering tracks

D.

Gaining access

Page: 14 / 21
Total 567 questions