New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pearson GSLC New Attempt

Page: 8 / 21
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 29

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is consists of various protocols present in each layer.

B.

It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

C.

It is generally described as having five abstraction layers.

D.

It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

Question 30

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

Options:

A.

Dsniff

B.

ethereal

C.

Despoof

D.

Neotrace

Question 31

Which of the following is used to translate domain names into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide?

Options:

A.

DFSR

B.

DNS

C.

DFS

D.

EFS

Question 32

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Off-channel verification.

B.

Using Secret keys for authentication.

C.

Using basic authentication.

D.

Using public key infrastructure authentication.

Page: 8 / 21
Total 567 questions