Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSLC GIAC Security Leadership Certification (GSLC) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSLC GIAC Security Leadership Certification (GSLC) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 567 questions

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.

Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The site should force its users to change their passwords from time to time.

B.

The site should use CAPTCHA after a specific number of failed login attempts.

C.

The site should increase the encryption key length of the password.

D.

The site should restrict the number of login attempts to only three times.

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The site should restrict the number of login attempts to only three times.

B.

The site should increase the encryption key length of the password.

C.

The site should use CAPTCHA after a specific number of failed login attempts.

D.

The site should force its users to change their passwords from time to time.

Which of the following is a structured review of the procurement process originated at the Plan Procurements process?

A.

Procurement document package

B.

Administer Procurements process

C.

Procurement auditing

D.

Project Procurement Management

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

A.

Network anti-spyware software

B.

Network anti-virus software

C.

Site surveys

D.

Protocol analyzers

Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?

A.

I LOVE YOU

B.

Melissa

C.

Klez

D.

Boot sector

Which firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network?

A.

Deep packet inspection

B.

Packet hosting

C.

Screened host

D.

Packet filtering

In which type of person-to-person attack does an attacker pretend to be someone else?

A.

In Person Attack

B.

Important User Posing

C.

Impersonation

D.

Third-Party Authorization

Which of the following is a process of monitoring data packets that travel across a network?

A.

SCP protocol

B.

Packet sniffing

C.

Rootkit

D.

ICMP

Which of the following RAID levels is supported by an operating system?

A.

RAID 4

B.

RAID 6

C.

RAID 0

D.

RAID 3

Which of the following tools can be used to perform polymorphic shell code attacks?

A.

ADMutate

B.

TrueCrypt

C.

Fragroute

D.

Mendax

Which of the following attacks can be performed by Brutus for cracking a password?

Each correct answer represents a complete solution. Choose two.

A.

Hybrid attack

B.

Replay attack

C.

Brute force attack

D.

Man-in-the-middle attack

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

Which of the following programs collects email addresses of users and creates a mailing list?

A.

Worms

B.

Stealth virus

C.

Boot virus

D.

Spambot

Which of the following is used to detect malicious activity such as port scans or even attempts for cracking into computers by monitoring network traffic?

A.

IIPS

B.

NIDS

C.

PIDS

D.

HIDS

You work as a Network Administrator in a company. The NIDS is implemented on the network. You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

A.

Half duplex

B.

Promiscuous

C.

Full Duplex

D.

Audit mode

Which of the following terms refers to a prolonged loss of power?

A.

Spike

B.

Brownout

C.

Surge

D.

Blackout

Which field is NOT defined while creating rules for the Network Honeypot rulebase?

A.

Response options

B.

Process mode

C.

Operation mode

D.

Notification options

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

A.

Physical

B.

Technical

C.

Administrative

D.

Automatic

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A.

IFB

B.

RFP

C.

RFI

D.

RFQ

John works as a network security officer in Gentech Inc. The company uses a TCP/IP network. While working on the network, a problem occurs related to the DNS resolution. Which of the following utilities can he use to diagnose the problem?

A.

IPConfig

B.

Ping

C.

Tracert

D.

nslookup

Which of the following wireless standards has a transmission speed of up to 720 Kbps?

A.

IEEE 802.11a

B.

Infrared

C.

Bluetooth

D.

Wi-Fi

You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure. Which of the following tools can you use to accomplish the task?

A.

Whisker

B.

WinSSLMiM

C.

httprint

D.

Wget

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

A.

An example of IP spoofing.

B.

A backdoor the intruder created so that he can re-enter the network.

C.

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

D.

An example of privilege escalation.

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Which of the following is a method of defeating a cryptographic scheme by trying a large number of possibilities?

A.

Zero-day

B.

IP spoofing

C.

Brute force

D.

FMS

Which of the following is not a man-made threat?

A.

Tidal wave

B.

Vandalism

C.

Terrorism

D.

Theft

Which of the following types of virus is capable of changing its signature to avoid detection?

A.

Polymorphic virus

B.

Boot sector virus

C.

Macro virus

D.

Stealth virus

You work as a Software Developer for PassGuide Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

A.

Cryptosystem

B.

Cryptographer

C.

Cryptographic toolkit

D.

Cryptanalyst

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

A.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

B.

The laptop will be able to access the wireless network but the security will be compromised.

C.

The WAP will allow the connection with the guest account's privileges.

D.

The laptop will not be able to access the wireless network.

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Contamination

B.

Eradication

C.

Recovery

D.

Identification

E.

Preparation

Page: 3 / 6
Total 567 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved