Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSLC Exam Dumps - GIAC Management Questions and Answers

Question # 44

Which of the following is used to communicate with an authentication server commonly used in UNIX networks?

Options:

A.

MS-CHAP

B.

IPX/SPX

C.

SMTP

D.

TACACS

Buy Now
Question # 45

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

Options:

A.

Automated penetration testing

B.

Code review

C.

Manual penetration testing

D.

Vulnerability scanning

Buy Now
Question # 46

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy?

Options:

A.

Create a GPO.

Configure Audit Object Access.

Attach the GPO to the domain.

B.

Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file.

C.

Enable debug logging on the DNS server.

D.

Create a new OU.

Move the DNS server account to the OU.

Create a GPO.

Configure Audit Logon events.

Attach the GPO to the OU.

Buy Now
Question # 47

You are the project manager for your organization and are trying to determine which vendor your organization will use. You have determined that any vendor that would like to bid on your project work will need to have a Microsoft Certified System Engineer on staff, have eight years of Cisco experience, and have at least two references from similar projects. What have you created in this scenario?

Options:

A.

Screening system for the vendors

B.

Weighting system for the vendors

C.

Preferred vendors list

D.

Bidders conference

Buy Now
Question # 48

Which interface does an IPS sensor use to communicate with a security appliance for management purposes?

Options:

A.

Management interface

B.

User interface

C.

Command and control interface

D.

Monitoring interface

Buy Now
Question # 49

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Stealth

B.

Snow

C.

Blindside

D.

ImageHide

Buy Now
Question # 50

You are responsible for securing the network at a law firm. You are concerned about printer security.

What steps should you take to prevent printer security breaches?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Remove the printer's driver from user computers.

B.

Scan printer hard drives for spyware and viruses.

C.

Limit print jobs.

D.

Secure any administrative connections (SSH, Telnet, etc.) to printers.

Buy Now
Question # 51

A Security administrator wants to configure policies that dictate what types of network traffic are allowed in the network. Which types of signature should he use to configure such type of policies?

Options:

A.

DoS signatures

B.

Connection signatures

C.

Exploit signatures

D.

String signatures

Buy Now
Question # 52

What is the major difference between a worm and a Trojan horse?

Options:

A.

A worm is a form of malicious program, while a Trojan horse is a utility.

B.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

C.

A worm is self replicating, while a Trojan horse is not.

D.

A worm spreads via e-mail, while a Trojan horse does not.

Buy Now
Question # 53

Which of the following terms describes the statement given below?

"It is a service on a computer system (usually a server) that delays incoming connections for as long as possible. The technique was developed as a defense against a computer worm, and the idea is that network abuses, such as spamming or broad scanning, are less effective if they take too long."

Options:

A.

Honeytokens

B.

Honeynet

C.

Honeypot

D.

Tarpit

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Aug 24, 2025
Questions: 567
GSLC pdf

GSLC PDF

$25.5  $84.99
GSLC Engine

GSLC Testing Engine

$28.5  $94.99
GSLC PDF + Engine

GSLC PDF + Testing Engine

$40.5  $134.99