New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC Management GSLC New Questions

Page: 7 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 25

Which of the following is the process of rewriting source and destination addresses of IP packets as they pass through a router or firewall?

Options:

A.

NAT

B.

Supernetting

C.

SNAT

D.

PAT

Question 26

Which of the following tools can be used to automate the MITM attack?

Options:

A.

Airjack

B.

Kismet

C.

IKECrack

D.

Hotspotter

Question 27

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms can exist inside files such as Word or Excel documents.

B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

C.

Worms replicate themselves from one system to another without using a host file.

D.

One feature of worms is keystroke logging.

Question 28

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Wiretap Act

C.

Computer Fraud and Abuse Act

D.

Economic Espionage Act of 1996

Page: 7 / 21
Total 567 questions