Free GIAC Security Leadership Exam GSLC Exam Practice Test
GSLC Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 567
-
Which of the following methods will allow data to be sent on the Internet in a secure format?
Answer: A Next Question -
The 3-way handshake method is used by the TCP protocol to establish a connection between a client and the server. It involves three steps:
Answer: B Next Question -
Which of the following statements are true about MS-CHAPv2?Each correct answer represents a complete solution. Choose all that apply.
Answer: A, ,B, ,C Next Question -
Which of the following are symptoms of a virus attack on your computer? Each correct answer represents a complete solution. Choose two.
Answer: A, ,B Next Question -
Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?
Answer: A Next Question -
You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?
Answer: B Next Question -
Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below:This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME.Which of the following viruses has the symptoms as the one described above?
Answer: B Next Question -
Which of the following RAID levels is supported by an operating system?
Answer: C Next Question -
Olive is the program manager for her organization. She has created a request for proposal for a large portion of her program. In this work to be procured she has set several requirements for the vendors to participate. The chief among these requirements is a vendor must have at least four licensed electricians in his team. This requirement for four licensed electricians is an example of which one of the following terms?
Answer: D Next Question -
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?Each correct answer represents a part of the solution. Choose all that apply.
Answer: A, ,B, ,C Next Question
Total Questions: 567