Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GSLC Exam Questions Tutorials

Page: 17 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 65

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Business continuity plan

C.

Contingency plan

D.

Continuity of Operations Plan

Question 66

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network environment. The network contains a Cisco Catalyst router to connect the internal network to the Internet. You want to secure your network from various attacks such as virus, spam, spyware, phishing, etc. You want to secure the whole network through a separate hardware device. Which of the following will you use?

Options:

A.

PIX-Firewall

B.

IDS

C.

IPS

D.

ASA

Question 67

Which of the following viruses replaces the boot sector data with its own malicious code?

Options:

A.

Chernobyl

B.

Explore.Zip

C.

MBR

D.

Nimda

Question 68

The Project Scope Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Create Work Breakdown Structure (WBS)

B.

Verify Scope

C.

Select Sellers

D.

Control Scope

Page: 17 / 21
Total 567 questions