Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSLC Exam Dumps - GIAC Management Questions and Answers

Question # 24

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

Options:

A.

Fixed Price with Economic Price Adjustment

B.

Fixed Price Incentive Fee

C.

Cost Plus Fixed Fee Contract

D.

Firm Fixed Price

Buy Now
Question # 25

You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

Options:

A.

Covering tracks

B.

Scanning

C.

Gaining access

D.

Reconnaissance

Buy Now
Question # 26

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-are-secure network. Which of the following IEEE-based traffic can be sniffed with Kismet?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

802.11g

B.

802.11a

C.

802.11b

D.

802.11n

Buy Now
Question # 27

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file:

(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)

When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:

A.

NetStumbler

B.

AiroPeek

C.

Kismet

D.

AirSnort

Buy Now
Question # 28

Which of the following statements about front door attack is true?

Options:

A.

In this type of attack, the hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses a dictionary of common words to find out the password of a user.

C.

This type of attack is used to sniff passwords or information from a legitimate transaction to be used for the hacker's advantage.

D.

In this type of attack, the hacker has all the correct information to get into a system and does not have to perform any additional task to get that information.

Buy Now
Question # 29

In which type of person-to-person attack does an attacker pretend to be someone else?

Options:

A.

In Person Attack

B.

Important User Posing

C.

Impersonation

D.

Third-Party Authorization

Buy Now
Question # 30

Which of the following is used to provide the service of exchanging data directly between two hosts on the same network?

Options:

A.

STP

B.

UDP

C.

TCP

D.

SNMP

Buy Now
Question # 31

You are the Administrator of a Windows 2000 based network for Info Tech Inc. You install and configure Certificate Authorities (CAs) on the network. You are currently configuring the public key group policy for the domain.

You configure the group policy to specify automatic enrollment and renewal for certificates. But when you attempt to test this configuration, you find that the enrollment is not working properly.

What is the most likely cause?

Options:

A.

The group policy is not enabled for the domain.

B.

You failed to add the CA certificate to the trusted root certification authorities container.

C.

Certificate enrollment and renewal is not enabled for the group policy.

D.

An enterprise CA is not online.

Buy Now
Question # 32

Which of the following standards is also known as IEEE 802.11i?

Options:

A.

Wi-Fi Protected Access 2 (WPA2)

B.

Wi-Fi Protected Access (WPA)

C.

Wired Equivalent Privacy (WEP)

D.

Wireless Access Protocol (WAP)

Buy Now
Question # 33

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Cryptanalysis

B.

Spoofing

C.

Packet sniffing

D.

Steganography

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Aug 24, 2025
Questions: 567
GSLC pdf

GSLC PDF

$25.5  $84.99
GSLC Engine

GSLC Testing Engine

$28.5  $94.99
GSLC PDF + Engine

GSLC PDF + Testing Engine

$40.5  $134.99