Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSLC Exam Dumps - GIAC Management Questions and Answers

Question # 84

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

MIC

B.

DAC

C.

RBAC

D.

MAC

Buy Now
Question # 85

Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn't specifically ask for the added features. This scenario is an example of which one of the following?

Options:

A.

Scope creep

B.

Gold plating

C.

Change management

D.

Value added change

Buy Now
Question # 86

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Eavesdropping

B.

Fingerprinting

C.

Web ripping

D.

TCP FTP proxy scanning

Buy Now
Question # 87

You are the project manager of the Workstation Improvement Project for your organization. This project will replace 925 workstations with new computers for your company's employees. Mark Jones, the sales manager, has requested that your project add 250 laptops as part of this project as his employees do not have workstations as they travel as part of the sales process. Mark insists that his department in the company can pay for the cost of the laptops. All of the following are components that will be affected by this change request except for which one?

Options:

A.

There will be a need for additional time to install the laptops.

B.

There will be a need for an additional project scope statement because of the change request.

C.

There will be a need for additional procurement management processes.

D.

There will be a need for additional risk analysis for the laptops.

Buy Now
Question # 88

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:

A.

Auditing

B.

Packet filtering

C.

Authentication

D.

Hacking

Buy Now
Exam Code: GSLC
Exam Name: GIAC Security Leadership Certification (GSLC)
Last Update: Aug 24, 2025
Questions: 567
GSLC pdf

GSLC PDF

$25.5  $84.99
GSLC Engine

GSLC Testing Engine

$28.5  $94.99
GSLC PDF + Engine

GSLC PDF + Testing Engine

$40.5  $134.99