GIAC GSLC - GIAC Security Leadership Certification (GSLC) Exam
Page: 1 / 23
Total 114 questions
Question #1 (Topic: Exam A)
Which of the following is an example of pseudonymous data?
A. Encrypting employee data with a private key before transmitting it for payroll processing
B. Using salted hashes to protect customer bank account data in a backend database
C. Collected poll results added together and displayed in total on a public website
D. Research analysis with names removed and replaced with a unique identifier for each participant
Answer: D
Question #2 (Topic: Exam A)
Using a network extraction approach for logging requires which of the following?
A. Scripts to parse multiple log formats
B. Sensors to capture mirrored traffic
C. System service configuration changes
D. System remote agents for log collection
Answer: A
Question #3 (Topic: Exam A)
What can be determined from the NIST SP800-53 related screenshot below?

A. Previous Logon (Access) Notification is required in all baselines
B. Account Management must be implemented before Unsuccessful Logon Attempts
C. Session Lock has the most control enhancements
D. Account Management must be implemented before Separation of Duties
Answer: D
Question #4 (Topic: Exam A)
S/MIME provides encryption for which of the following?
A. Email
B. VPN
C. Network authentication
D. Web applications
Answer: A
Question #5 (Topic: Exam A)
At which stage of the Security Awareness Maturity Model is annual training first implemented?
A. Long-term sustainment and cultural change
B. Metrics framework
C. Compliance-focused
D. Promoting awareness and behavioral change
Answer: D