Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSLC GIAC Security Leadership Certification (GSLC) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSLC GIAC Security Leadership Certification (GSLC) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 6
Total 567 questions

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

A.

It can handle encrypted and unencrypted traffic equally.

B.

It can detect events scattered over the network.

C.

It is a technique that allows multiple computers to share one or more IP addresses.

D.

It cannot detect events scattered over the network.

Which of the following sections come under the ISO/IEC 27002 standard?

A.

Financial assessment

B.

Security policy

C.

Risk assessment

D.

Asset management

Which of the following viruses infects multiple targets?

A.

Macro virus

B.

Multipartite virus

C.

Polymorphic virus

D.

Stealth virus

Mark works as a Network Administrator for Technet Inc. The company has a Windows 2003 domainbased network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the RAID-5 volume?

A.

Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.

B.

Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

C.

Use Disk Management, select the failed drive, and then regenerate the volume.

D.

Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.

It is the technique for gathering information for a Web site owner about a user through a few lines of code that reside in the Web pages. This information is gathered through __________.

A.

Spambot

B.

Spyware

C.

Web Bugs

D.

Bogus spyware removal programs

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

A.

Using WPA encryption

B.

MAC filtering the router

C.

Using WEP encryption

D.

Not broadcasting SSID

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

A.

SSHGuard

B.

nmap

C.

Fail2Ban

D.

portsentry

E.

OpenSSL

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You have recently added three new SCSI hard disk drives to a domain controller that already has two physical disk drives. The new SCSI disk drives are configured in a RAID-5 array. You are required to enhance the performance of the Active Directory database on the domain controller. Which of the following steps will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

A.

Move the log files to a separate physical disk other than the one used in RAID-5 or used by the operating system.

B.

Move the log files to the RAID-5 array.

C.

Move the NTDS.DIT file to the RAID-5 array.

D.

Move the NTDS.DIT file to a disk other than the one used in RAID-5 or used by the operating system.

You work as a project manager for an IT project. You are analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule. In which of the following Knowledge Areas are you working on?

A.

Project Integration Management

B.

Project Time Management

C.

Project Scope Management

D.

Project Risk Management

You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?

A.

Mitigation

B.

Acceptance

C.

Exploiting

D.

Sharing

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

A.

Internet Authentication Server

B.

Certificate User

C.

Certification Authority

D.

Domain Controller

Which of the following can be used to mitigate the evil twin phishing attack?

A.

Magic Lantern

B.

Obiwan

C.

IPSec VPN

D.

SARA

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

A.

Cookie poisoning

B.

Cross site scripting

C.

Man-in-the-middle attack

D.

Computer-based social engineering

John works as a Security Administrator for Enet Inc. He uses a 4 digits personal identification number (PIN) to access the computer and a token is used to perform offline checking whether John has entered the correct PIN or not. Which of the following attacks is possible on John's computer?

A.

Replay

B.

Smurf

C.

Man-In-The-Middle

D.

Brute force

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B.

Black box testing simulates an attack from someone who is familiar with the system.

C.

Black box testing simulates an attack from someone who is unfamiliar with the system.

D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.

Managerial wisdom is the combination of knowledge as well as experience. It is the ability of the leaders to understand the members of the team. Which of the following are the characteristics that come under managerial wisdom?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dominating

B.

Simple

C.

Values

D.

Listener

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

A.

Macro virus

B.

Stealth virus

C.

E-mail virus

D.

Polymorphic virus

Which of the following types of security will be the cause of concern if the server has been stolen from the organization's premises?

A.

Information security

B.

Operational security

C.

Physical security

D.

User authentication

You are trying to select a particular wireless encryption algorithm. You are concerned that it implements as much of the wireless 802.11i standard as possible. Which encryption algorithm should you implement?

A.

WEP

B.

WPA

C.

WEP2

D.

WPA2

Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?

A.

Project Cost Management

B.

Project Integration Management

C.

Project Time Management

D.

Project Scope Management

E.

Project Quality Management

Page: 6 / 6
Total 567 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved