Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSLC Exam Dumps - GIAC Management Questions and Answers

Question # 54

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Buy Now
Question # 55

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Wiretap Act

C.

Computer Fraud and Abuse Act

D.

Economic Espionage Act of 1996

Buy Now
Question # 56

Which of the following are the tools and techniques of the Plan Procurements process?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Contract types

B.

Expert judgment

C.

Probability and impact matrix

D.

Make-or-buy analysis

Buy Now
Question # 57

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

C.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

D.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

Buy Now
Question # 58

Which of the following is NOT an input of the Administer Procurements process?

Options:

A.

Contract

B.

Requirements traceability matrix

C.

Procurement management plan

D.

Procurement documents

E.

Work performance information

Buy Now
Question # 59

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

Options:

A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use EFS.

D.

Use a firewall.

Buy Now
Question # 60

Which of the following contains information that is read by a Web application whenever a user visits a site?

Options:

A.

PII

B.

Cookie

C.

Rootkit

D.

DiD

Buy Now
Question # 61

Which method is used to configure several disk drives into a logical disk drive and provides faulttolerance, redundancy, lower latency, and higher bandwidth for read/write operations?

Options:

A.

DRM

B.

DAC

C.

RAID

D.

MAC

Buy Now
Question # 62

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

2Mosaic

B.

Gifshuffle

C.

Active Attacks

D.

Steg-Only Attack

Buy Now
Question # 63

Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources and information?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Training and awareness

B.

Employee registration and accounting

C.

Network authentication

D.

Encryption

E.

Disaster preparedness and recovery plans

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Aug 24, 2025
Questions: 567
GSLC pdf

GSLC PDF

$25.5  $84.99
GSLC Engine

GSLC Testing Engine

$28.5  $94.99
GSLC PDF + Engine

GSLC PDF + Testing Engine

$40.5  $134.99