Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSLC Exam Dumps - GIAC Management Questions and Answers

Question # 74

Which of the following protocols is used for destination and error reporting functions in datagram processing?

Options:

A.

PPP

B.

SRP

C.

NTP

D.

ICMP

Buy Now
Question # 75

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

• What ports are open on our network systems

• What hosts are available on the network

• Identify unauthorized wireless access points

• What services (application name and version) those hosts are offering

• What operating systems (and OS versions) they are running

• What type of packet filters/firewalls are in use

Which of the following tools is Victor using?

Options:

A.

Nmap

B.

Sniffer

C.

Kismet

D.

Nessus

Buy Now
Question # 76

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WEP key

B.

IP address of the router

C.

MAC address of the router

D.

SSID of the WLAN

Buy Now
Question # 77

Which wireless security protocol is also known as IEEE 802.11i?

Options:

A.

WPA2

B.

WEP

C.

TKIP

D.

EAP

Buy Now
Question # 78

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

ICMP

B.

SCP protocol

C.

Rootkit

D.

Packet sniffing

Buy Now
Question # 79

Which of the following is a software testing method that uses an internal perspective of the system to design test cases based on the internal structure?

Options:

A.

Water Fall

B.

Black box

C.

White box

D.

Gray box

Buy Now
Question # 80

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Strong authentication method

B.

Firewall

C.

Strong data encryption during travel

D.

Anti-virus programs

Buy Now
Question # 81

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

Mac flooding

B.

DNS poisoning

C.

IP spoofing

D.

Man-in-the-middle

Buy Now
Question # 82

Which of the following is not a man-made threat?

Options:

A.

Tidal wave

B.

Vandalism

C.

Terrorism

D.

Theft

Buy Now
Question # 83

Which type of repudiation states that the creator of the message denies ever creating the message even after creating it?

Options:

A.

Repudiation of submission

B.

Repudiation of creation

C.

Repudiation of receipt

D.

Repudiation of origin

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Aug 24, 2025
Questions: 567
GSLC pdf

GSLC PDF

$25.5  $84.99
GSLC Engine

GSLC Testing Engine

$28.5  $94.99
GSLC PDF + Engine

GSLC PDF + Testing Engine

$40.5  $134.99