Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSLC GIAC Security Leadership Certification (GSLC) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSLC GIAC Security Leadership Certification (GSLC) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 567 questions

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

A.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

B.

Remove the SNMP agent or disable the SNMP service.

C.

Monitor the programs running on the server to see whether any new process is running on the server or not.

D.

Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Which of the following features of IE prevent users from a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

A.

Pop-up blocker

B.

Cookie

C.

Content Advisor

D.

Phishing Filter

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He installs a sniffer on the We-are-secure server thinking that the following protocols of the We-are-secure server are being used in the network:

HTTP

SSL

SSH

IPSec

Considering the above factors, which of the following types of packets can he expect to see captured in encrypted form when he checks the sniffer's log file?

Each correct answer represents a complete solution. Choose all that apply.

A.

SSH

B.

SSL

C.

HTTP

D.

IPSec

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company's network. Which of the following encryption types will Linux use?

A.

CHAP

B.

MSCHAP

C.

RC2

D.

3DES

Which of the following types of cryptography algorithms is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation?

A.

RC2

B.

Stream cipher

C.

Block cipher

D.

Triple DES

Which of the following options is an approach to restricting system access to authorized users?

A.

MIC

B.

MAC

C.

RBAC

D.

DAC

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is an IPSec protocol.

B.

It is a text-based communication protocol.

C.

It uses TCP port 22 as the default port and operates at the application layer.

D.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you'll first need to understand all of the following except for which one?

A.

Summary milestone for the likely project phases

B.

Measurable project objectives and related success criteria

C.

Summary budget

D.

Quality improvement program your company uses

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

A.

Internet Key Exchange

B.

Encapsulating Security Payload

C.

Authentication Header

D.

Skinny Client Control Protocol

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?

A.

Land attack

B.

Internal attack

C.

DoS attack

D.

Reconnaissance attack

Which of the following tools can be used for stress testing of a Web server?

Each correct answer represents a complete solution. Choose two.

A.

Internet bots

B.

Spyware

C.

Anti-virus software

D.

Scripts

Which of the following domains of the DNS hierarchy consists of categories found at the end of domain names, such as .com or .uk and divides the domains into organizations (.org), businesses (.com), countries (.uk), and other categories?

A.

Top-level domain

B.

Root-level domain

C.

Second level domain

D.

Name server

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

A.

Stick

B.

ADMutate

C.

Absinthe

D.

Fragroute

Which of the following can provide security against man-in-the-middle attack?

A.

Strong data encryption during travel

B.

Firewall

C.

Anti-virus programs

D.

Strong authentication method

You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?

A.

Implement a strong password policy.

B.

Implement a honey pot.

C.

Implement a strong firewall.

D.

Implement network based anti virus.

Which of the following relies on a physical characteristic of the user to verify his identity?

A.

Kerberos v5

B.

Social Engineering

C.

CHAP

D.

Biometrics

Which of the following is used to communicate with an authentication server commonly used in UNIX networks?

A.

MS-CHAP

B.

IPX/SPX

C.

SMTP

D.

TACACS

You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?

A.

A Virus

B.

A reactive IDS.

C.

A Honey Pot

D.

A Polymorphic Virus

Which of the following statements is true about the difference between worms and Trojan horses?

A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms replicate themselves while Trojan horses do not.

D.

Worms can be distributed through emails while Trojan horses cannot.

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 2510

B.

18 U.S.C. 1029

C.

18 U.S.C. 1028

D.

18 U.S.C. 1030

Which of the following is a signature-based intrusion detection system (IDS) ?

A.

Snort

B.

RealSecure

C.

Tripwire

D.

StealthWatch

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Which of the following activities result in change requests?

Each correct answer represents a complete solution. Choose all that apply.

A.

Preventive actions

B.

Inspection

C.

Defect repair

D.

Corrective actions

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Steganography

B.

Email spoofing

C.

Social engineering

D.

Web ripping

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

A.

IDS

B.

Snort

C.

Firewall

D.

WIPS

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domain-based network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him. Which of the following steps will you take to accomplish the task?

A.

Remove domain names of such emails from the Safe Sender's list.

B.

Configure phishing filter in Internet Explorer 7.0.

Configure it to filter all phishing mails.

C.

Configure phishing filter in Windows Mail.

Configure it to move such mails to the Junk Mail folder.

D.

Add domain names of such emails in the Block Sender's list.

You are a Network Administrator in an enterprise. You have been assigned the task of installing Windows 2000 and some other applications, on each computer on the network. But in the enterprise environment, it is not cost effective to install Windows 2000 and other applications, using the standard interactive setup on each computer. You plan to perform automated installation on multiple computers. Which of the following installation tasks can be automated?

Each correct answer represents a complete solution. Choose all that apply.

A.

Service Packs for Windows 2000 Server.

B.

Any application that does not run as a service.

C.

Additional language support for Windows 2000 Server, through the installation of various language packs.

D.

Any application that runs as a service.

E.

The core operating system of Windows 2000 Server.

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Changing keys often.

B.

Using the longest key supported by hardware.

C.

Using a 16 bit SSID.

D.

Using a non-obvious key.

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

A.

Spoofing

B.

Phishing

C.

Password guessing attack

D.

Replay attack

You work as an Administrator for Bluesky Inc. The company has 145 Windows XP Professional client computers and eighty Windows 2003 Server computers. You want to install a security layer of WAP specifically designed for a wireless environment. You also want to ensure that the security layer provides privacy, data integrity, and authentication for client-server communications over a wireless network. Moreover, you want a client and server to be authenticated so that wireless transactions remain secure and the connection is encrypted. Which of the following options will you use to accomplish the task?

A.

Wireless Transport Layer Security (WTLS)

B.

Recovery Console

C.

Wired Equivalent Privacy (WEP)

D.

Virtual Private Network (VPN)

Page: 1 / 6
Total 567 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved