New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GSLC Premium Exam Questions

Page: 5 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 17

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Warm site

B.

Hot site

C.

Off site

D.

Cold site

Question 18

Which of the following is used to describe the type of FTP access in which a user does not have permissions to list the contents of directories, but can access the contents if he knows the path and file name?

Options:

A.

Secure FTP

B.

Blind FTP

C.

Passive FTP

D.

Hidden FTP

Question 19

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.

ESP is always used in combination with Authentication Header (AH).

B.

ESP can encrypt data and verify data integrity.

C.

ESP is never used in combination with Authentication Header (AH).

D.

ESP only verifies data integrity.

Question 20

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.

The distortion technique

B.

The substitution technique

C.

The cover generation technique

D.

The spread spectrum technique

Page: 5 / 21
Total 567 questions