Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Newly Released GIAC GSLC Exam PDF

Page: 2 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 5

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

Options:

A.

JPlag

B.

BackTrack

C.

Vedit

D.

Ettercap

Question 6

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Backup

B.

Symmetric encryption

C.

Firewall

D.

Antivirus

Question 7

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Strong encryption

B.

Fiber-optic cable

C.

Firewall

D.

Strong password

Question 8

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Options:

A.

Single Sign-On

B.

Dynamic

C.

One-time password

D.

Kerberos

Page: 2 / 21
Total 567 questions