GIAC GSLC - GIAC Security Leadership Certification (GSLC) Exam

Page:    1 / 114   
Total 567 questions

Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals:
No external traffic should be allowed into the network.
Administrators should be able to restrict the websites which can be accessed by the internal users.
Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.)

  • A. Internet Connection Sharing (ICS)
  • B. Network Address Translator (NAT)
  • C. Firewall
  • D. Proxy Server
  • E. Routing and Remote Access Service (RRAS)


Answer : D

Which of the following backup sites takes the longest recovery time?

  • A. Cold site
  • B. Hot site
  • C. Warm site
  • D. Mobile backup site


Answer : A

You are the project manager for the TTR project. You are in the process of gathering information for risk identification. You ask experts to participate in the process through their emails for maintaining anonymity. You collect the responses, summarize them, and are then re-circulated to the experts for further comment. Which of the following techniques are you using for risk identification?

  • A. SWOT analysis
  • B. Delphi
  • C. Expert judgment
  • D. Brainstorming


Answer : B

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you'll first need to understand all of the following except for which one?

  • A. Summary milestone for the likely project phases
  • B. Measurable project objectives and related success criteria
  • C. Summary budget
  • D. Quality improvement program your company uses


Answer : D

You work as a Network Administrator for McNeil Inc. The company has a Windows Active
Directorybased single domain single forest network. The functional level of the forest is
Windows Server 2003. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:
The wireless network communication should be secured.
The laptop users should be able to use smart cards for getting authenticated.
In order to accomplish the tasks, you take the following steps:
Configure 802.1x and WEP for the wireless connections.
Configure the PEAP-MS-CHAP v2 protocol for authentication
What will happen after you have taken these steps?

  • A. Both tasks will be accomplished.
  • B. The wireless network communication will be secured.
  • C. None of the tasks will be accomplished.
  • D. The laptop users will be able to use smart cards for getting authenticated.


Answer : B

Page:    1 / 114   
Total 567 questions