Free GIAC Security Leadership Exam GSLC Exam Practice Test

UNLOCK FULL
GSLC Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 114
Total Questions: 567
  • Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

    Answer: C, ,D Next Question
  • Which of the following are the limitations for the cross site request forgery (CSRF) attack?Each correct answer represents a complete solution. Choose all that apply.

    Answer: A, ,B Next Question
  • John works as a Website Administrator in ABC Inc. The company has to set a privacy policy on all the computers. The policy requires John to restrict only third party cookies that do not have a compact private policy or that use personally identifiable information without a user's implicit consent. He reports to the Technical Support Executive that he wants to set the policy. The Technical Support Executive asks him to configure the settings in the Privacy tab page. Which of the following privacy settings will John use to accomplish the task?

    Answer: B Next Question
  • Which of the following heights of fence deters only casual trespassers?

    Answer: A Next Question
  • Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

    Answer: C Next Question
  • Which of the following malware spread through the Internet and caused a large DoS attack in 1988?

    Answer: C Next Question
  • Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

    Answer: A Next Question
  • You work as a technician for Secure Net Inc. You receive an e-mail from your software vendor.The e-mail contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed right away, your system will crash and you will lose all your data. Now they require your maintenance account password.Which of the following types of security attacks do you think it is?

    Answer: A Next Question
  • You work as a Network Administrator for Net World Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. A Public Key Infrastructure (PKI) is installed on a server in the domain. You are planning to go on vacation for two weeks. Your team has three assistant administrators. You are required to accomplish the following tasks:Delegate the authority to the assistant administrators to issue, approve, and revoke certificates.The solution must involve least administrative burden.Which of the following steps will you take to accomplish the tasks?

    Answer: D Next Question
  • Which of the following can be performed to verify the effectiveness of a quality management system?

    Answer: D Next Question
Page: 1 / 114
Total Questions: 567