Valid GSLC Dumps shared by ExamDiscuss.com for Helping Passing GSLC Exam! ExamDiscuss.com now offer the newest GSLC exam dumps, the ExamDiscuss.com GSLC exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com GSLC dumps with Test Engine here:

Access GSLC Dumps Premium Version
(590 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 79/276

Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (276q)
Question 1: You work as a Network Administrator for NetTech Inc. The com...
Question 2: Which field is NOT defined while creating rules for the Netw...
Question 3: Which of the following is a process of monitoring data packe...
Question 4: You have forgotten your password of an online shop. The web ...
Question 5: A project team member has just identified a new project risk...
Question 6: The Project Scope Management knowledge area focuses on which...
Question 7: Which of the following are examples of administrative contro...
Question 8: You work as a Network Administrator for Infonet Inc. The com...
Question 9: Kerberos is a computer network authentication protocol that ...
Question 10: IDS systems can be classified in many different ways. Which ...
Question 11: Sara, a security technician, has received notice that a vend...
Question 12: Which of the following are the countermeasures against WEP c...
Question 13: John works as a professional Ethical Hacker. He has been ass...
Question 14: Which of the following tools can be used for stress testing ...
Question 15: You are working in a functional organization and are managin...
Question 16: Which of the following methods will free up bandwidth in a W...
Question 17: In which of the following attacks does an attacker create th...
Question 18: You work as a Software Developer for PassGuide Inc. The comp...
Question 19: Joseph works as a Network Administrator for WebTech Inc. He ...
Question 20: You are a project manager who is completing a project for an...
Question 21: Which of the following is a physical or logical subnetwork t...
Question 22: Which type of attack is the unauthorized access of informati...
Question 23: Which of the following statements about Digest authenticatio...
Question 24: All of the following are the password cracking attacks perfo...
Question 25: John works as a professional Ethical Hacker. He has been ass...
Question 26: You work as a project manager for TYU project. You are plann...
Question 27: You work as a Network Administrator for Infonet Inc. The com...
Question 28: Which of the following statements about Public Key Infrastru...
Question 29: Victor works as a professional Ethical Hacker for SecureEnet...
Question 30: Which of the following is the practice of a domain name regi...
Question 31: Which of the following statements about IPSec are true? Each...
Question 32: The 3-way handshake method is used by the TCP protocol to es...
Question 33: Which of the following are used as a cost estimating techniq...
Question 34: You work as the Network Administrator for a company that doe...
Question 35: Adrian knows the host names of all the computers on his netw...
Question 36: Which interface does an IPS sensor use to communicate with a...
Question 37: You want to use PGP files for steganography. Which of the fo...
Question 38: John works as an IT Technician for PassGuide Inc. One mornin...
Question 39: You work as a Network Administrator for Tech Perfect Inc. Th...
Question 40: According to the security requirements given in case study, ...
Question 41: Nancy is the project manager for a new construction project....
Question 42: A sequence number is a 32-bit number ranging from 1 to 4,294...
Question 43: What is another term that can be assigned to the pre-program...
Question 44: Which of the following standards is also known as IEEE 802.1...
Question 45: The Human Resources department has a parent shared folder se...
Question 46: Which of the following can be used as a countermeasure again...
Question 47: Which of the following is used to authenticate asymmetric ke...
Question 48: A war dialer is a tool that is used to scan thousands of tel...
Question 49: You work as a Network Administrator for Perfect Solutions In...
Question 50: Your project spans the entire organization. You would like t...
Question 51: John works as a professional Ethical Hacker. He has been ass...
Question 52: John works as a Network Administrator for We-are-secure Inc....
Question 53: Which of the following is an authentication protocol used by...
Question 54: Which of the following tools is based on Linux and used to c...
Question 55: You work as a Network Administrator for Infosec Inc. The com...
Question 56: Which of the following statements about reconnaissance is tr...
Question 57: Which of the following tools can be used to perform ICMP tun...
Question 58: Rick works as the Network Administrator of a Windows 2000 ne...
Question 59: Atechnician is deploying virtual machines for multiple custo...
Question 60: Which of the following statements about Secure Shell (SSH) a...
Question 61: Which of the following is a fake target that deters hackers ...
Question 62: Which of the following blocks unwanted advertisements and sm...
Question 63: John works as a professional Ethical Hacker. He has been ass...
Question 64: On Monday, all company employees report being unable to conn...
Question 65: The Project Scope Management knowledge area focuses on which...
Question 66: Which of the following are the countermeasures against a man...
Question 67: An attacker makes an attempt against a Web server. The resul...
Question 68: What are the steps related to the vulnerability management p...
Question 69: You have inserted a Trojan on your friend's computer and you...
Question 70: Which of the following is a software testing method that use...
Question 71: Which of the following technologies is used to detect unauth...
Question 72: A user in your department complains about a slow Internet co...
Question 73: Which of the following tools is used to attack the Digital W...
Question 74: Which of the following protocols uses a combination of publi...
Question 75: Which of the following options is an approach to restricting...
Question 76: These are false reports about non-existent viruses. In these...
Question 77: You work as a professional Ethical Hacker. You are assigned ...
Question 78: Which of the following attacks allows an attacker to recover...
Question 79: Which of the following components are usually found in an In...
Question 80: Which of the following is used to identify a particular 802....
Question 81: Which of the following is the method of hiding data within a...
Question 82: You are the program manager for your project. You are workin...
Question 83: You have just set up a wireless network for customers at a c...
Question 84: Your company is covered under a liability insurance policy, ...
Question 85: Which of the following is the process of rewriting source an...
Question 86: Which of the following types of authentication is generally ...
Question 87: You are concerned about attackers simply passing by your off...
Question 88: Which of the following cryptographic system services ensures...
Question 89: A company determines a need for additional protection from r...
Question 90: Which of the following tasks can be performed by a malicious...
Question 91: Which of the following attacks allows the bypassing of acces...
Question 92: How can you calculate the Annualized Loss Expectancy (ALE) t...
Question 93: What is a stakeholder analysis chart?...
Question 94: Rick is the project manager for TTM project. He is in the pr...
Question 95: An Active Attack is a type of steganography attack in which ...
Question 96: You are concerned about rogue wireless access points being c...
Question 97: Which of the following techniques is based on a set of crite...
Question 98: SSH is a network protocol that allows data to be exchanged b...
Question 99: Which of the following statements about Encapsulating Securi...
Question 100: Which of the following options is an approach to restricting...
Question 101: One of the sales people in your company complains that somet...
Question 102: Which of the following is a model that uses a predefined set...
Question 103: Part of your change management plan details what should happ...
Question 104: Which of the following files must be configured to enable ho...
Question 105: Which of the following is a virus that can redirect the disk...
Question 106: You are the Network Administrator for a company that frequen...
Question 107: Which of the following features of IE prevent users from a t...
Question 108: David works as a Network Administrator for NetTech Inc. The ...
Question 109: John works as a Security Administrator for Enet Inc. He uses...
Question 110: A user has opened a Web site that automatically starts downl...
Question 111: Which of the following terms describes the statement given b...
Question 112: You are the project manager for your organization and are tr...
Question 113: Which of the following terms describes the statement given b...
Question 114: John works as a professional Ethical Hacker. He has been ass...
Question 115: Matt, the network engineer, has been tasked with separating ...
Question 116: John is a malicious attacker. He illegally accesses the serv...
Question 117: Victor wants to use Wireless Zero Configuration (WZC) to est...
Question 118: In which of the following techniques does an attacker change...
Question 119: In Which of the following types of white box testing are the...
Question 120: You work as a Network Administrator for Net World Internatio...
Question 121: You are a project manager of a large construction project. W...
Question 122: Which of the following viruses is designed to prevent antivi...
Question 123: Which of the following evidences are the collection of facts...
Question 124: Mark works as a Network Administrator for NetTech Inc. Sever...
Question 125: Donna, a stakeholder in your project to create new software,...
Question 126: Which of the following are the types of access controls? Eac...
Question 127: Which of the following can provide security against man-in-t...
Question 128: Which of the following encrypts its code differently with ea...
Question 129: Which of the following refers to the process of verifying th...
Question 130: You are the project manager of the NJJ project. Your enterpr...
Question 131: Victor works as a professional Ethical Hacker for SecureEnet...
Question 132: Which of the following technologies is used to detect unauth...
Question 133: Which of the following attacks is any form of cryptanalysis ...
Question 134: While configuring a new access layer switch, the administrat...
Question 135: Joe, a technician at the local power plant, notices that sev...
Question 136: Which of the following is a part of a company's network that...
Question 137: John works as a professional Ethical Hacker. He has been ass...
Question 138: Mark works as a Network Administrator for NetTech Inc. The c...
Question 139: Maria has been recently appointed as a Network Administrator...
Question 140: Which of the following is used to translate domain names int...
Question 141: You have configured a virtualized Internet browser on your W...
Question 142: A Chief Information Security Officer (CISO) is tasked with o...
Question 143: Which of the following authentication methods is used to ena...
Question 144: Which of the following is a network protocol that allows dat...
Question 145: Which of the following is used for high-level or comprehensi...
Question 146: Which of the following types of attacks cannot be prevented ...
Question 147: You are concerned about war driving bringing hackers attenti...
Question 148: Mark works as a Network Administrator for NetTech Inc. The c...
Question 149: You configure a wireless router at your home. To secure your...
Question 150: You work in an enterprise as a Network Engineer. Your enterp...
Question 151: Which of the following is involved with the improvement of d...
Question 152: You work as an Administrator for Bluesky Inc. The company ha...
Question 153: Fill in the blank with the appropriate term. NOTE. Do not us...
Question 154: Which of the following statements correctly defines a script...
Question 155: You are concerned about possible hackers doing penetration t...
Question 156: John works as a professional Ethical Hacker. He is assigned ...
Question 157: Which of the following wireless security features provides t...
Question 158: Mark works as a Network Administrator for Infonet Inc. The c...
Question 159: Your project is to implement a new operating system for all ...
Question 160: Fill in the blank with the appropriate word. A_______ is a c...
Question 161: Maria works as a Risk Analysis Manager for Gentech Inc. She ...
Question 162: Which of the following items are generally analyzed by Inter...
Question 163: Mark works as a Network Administrator for NetTech Inc. The c...
Question 164: Which of the following protocols is used as a transport prot...
Question 165: You work as a Network Administrator for Blue Well Inc. The c...
Question 166: You check the logs on several clients and find that there is...
Question 167: Fill in the blank with the appropriate word. ________ is als...
Question 168: Rick is a project manager of a construction project. He is a...
Question 169: Adam works as a Penetration Tester for Umbrella Inc. He is a...
Question 170: A router has a single Ethernet connection to a switch. In th...
Question 171: Which of the following tools can be used for the anti-phishi...
Question 172: Which of the following security policies will you implement ...
Question 173: All of the following steps should be taken to prevent a Web ...
Question 174: Which of the following processes is described in the stateme...
Question 175: You are concerned about rogue wireless access points being c...
Question 176: You work as a Network Administrator in a company. The NIDS i...
Question 177: Which of the following types of firewall ensures that the pa...
Question 178: A user has opened a Web site that automatically starts downl...
Question 179: Which of the following algorithms can be used to check the i...
Question 180: You work as a Network Administrator for NetPerfect Inc. You ...
Question 181: Which of the following programs collects email addresses of ...
Question 182: Which of the following programs can collect various types of...
Question 183: Which of the following layers of TCP/IP model is used to mov...
Question 184: Which of the following processes is NOT a part of the Projec...
Question 185: An organization does not have adequate resources to administ...
Question 186: You are a Web Administrator of Millennium Inc. The company h...
Question 187: Which of the following is a type of encryption that uses a s...
Question 188: John works as a professional Ethical Hacker. He has been ass...
Question 189: Which of the following devices would MOST likely have a DMZ ...
Question 190: Which of the following are symptoms of a virus attack on you...
Question 191: You work as a project manager for BlueWell Inc. You are work...
Question 192: Which of the following is a popular replacement for halon ga...
Question 193: Which of the following is the best encryption algorithm to e...
Question 194: Which of the following are countermeasures to prevent unauth...
Question 195: Which of the following terms refers to a prolonged loss of p...
Question 196: You are a project manager for a recycling company. You are i...
Question 197: Which of the following is an input of the close procurements...
Question 198: You are the program manager for your organization. Managemen...
Question 199: Which of the following uses public key cryptography to encry...
Question 200: Which of the following are considered Bluetooth security vio...
Question 201: What does a firewall check to prevent certain ports and appl...
Question 202: Which of the following statements about a certification auth...
Question 203: Which of the following security protocols can be used to sup...
Question 204: Which firewall architecture uses two NICs with a screening r...
Question 205: Which of the following honeypots captures limited amounts of...
Question 206: The Project Procurement Management knowledge area focuses on...
Question 207: Which of the following types of computers is used for attrac...
Question 208: You have installed Windows Vista Home Premium on your home c...
Question 209: In what type of attack does an attacker capture packets cont...
Question 210: Which of the following statements are true about WPA? Each c...
Question 211: Which of the following types of attacks cannot be prevented ...
Question 212: Which of the following are the examples of administrative co...
Question 213: Which of the following terms describes an attempt to transfe...
Question 214: Which of the following are the goals of risk management? Eac...
Question 215: Mark works as a Network Administrator for We-are-secure Inc....
Question 216: A honey pot is a computer trap that is used to attract poten...
Question 217: Which of the following tools can be used to read NetStumbler...
Question 218: You are the Administrator of a Windows 2000 based network fo...
Question 219: Which of the following is not a man-made threat?...
Question 220: John works as a Website Administrator in ABC Inc. The users ...
Question 221: John works as a professional Ethical Hacker. He has been ass...
Question 222: Holly is the project manager of the GHQ Project for her orga...
Question 223: John works as a professional Ethical Hacker. He has been ass...
Question 224: Which of the following is NOT a principle and practice of th...
Question 225: Which of the following wireless standards has a transmission...
Question 226: You are the project manager of the HQQ Project for your comp...
Question 227: Roberta is the project manager of the KJL Project for her co...
Question 228: Which of the following is a signature-based intrusion detect...
Question 229: In which of the following does an attacker use multiple comp...
Question 230: Which of the following firewalls inspects the actual content...
Question 231: You are an Administrator for a network at an investment bank...
Question 232: John works as a Website Administrator in ABC Inc. The compan...
Question 233: Which key of the Asymmetric encryption is used to encrypt th...
Question 234: Management has asked you to perform a risk audit and report ...
Question 235: Which function of incident handling involves in-depth invest...
Question 236: You work in a company that accesses the Internet frequently....
Question 237: Your company network has been infected with a virus. You hav...
Question 238: You work as a professional Ethical Hacker. You are assigned ...
Question 239: Which of the following applications work as mass-emailing wo...
Question 240: Which of the following is used to detect malicious activity ...
Question 241: Janet is the project manager of the NHQ Project for her comp...
Question 242: You and your project team are just starting the risk identif...
Question 243: You are the project manager for the TTR project. You are in ...
Question 244: Which of the following is the best encryption algorithm to e...
Question 245: Which of the following statements about Encapsulating Securi...
Question 246: Which type of virus is able to alter its own code to avoid b...
Question 247: Every network device contains a unique built in Media Access...
Question 248: Which of the following are the tools and techniques of the P...
Question 249: Mark works as a Network Administrator for BlueWell Inc. Whil...
Question 250: Consider the following diagram: (Exhibit) What is the highli...
Question 251: A Security administrator wants to configure policies that di...
Question 252: You work as a Consumer Support Technician for ABC Inc. The c...
Question 253: Which of the following applications would NOT be considered ...
Question 254: You work as a Software Developer for PassGuide Inc. The comp...
Question 255: Which of the following exists between the client and the ser...
Question 256: Which of the following relies on a physical characteristic o...
Question 257: PsPasswd is a tool used by network administrators to change ...
Question 258: In the image of the Screened Host Firewall Architecture give...
Question 259: You work as a Network Administrator for Tech Perfect Inc. Th...
Question 260: What is the term used to describe the cost of the solution a...
Question 261: You see the career section of a company's Web site and analy...
Question 262: Which of the following IEEE standards is defined to enhance ...
Question 263: A security administrator is segregating all web-facing serve...
Question 264: Which of the following heights of fence deters only casual t...
Question 265: What course of action can be taken by a party if the current...
Question 266: Which of the following contains information that is read by ...
Question 267: You are responsible for network security at a defense contra...
Question 268: An executive in your company reports odd behavior on her PDA...
Question 269: Which of the following can be performed to verify the effect...
Question 270: A database administrator contacts a security administrator t...
Question 271: Which of the following terms related to risk management repr...
Question 272: Which of the following is used to translate domain names int...
Question 273: Andrew works as a Network Administrator for Infonet Inc. The...
Question 274: Rick works as a Computer Forensic Investigator for BlueWells...
Question 275: Which of the following viruses replaces the boot sector data...
Question 276: You are the project manager for an important, high-profile p...