GIAC Security Leadership Exam Practice Test

Page: 1 / 14
Total 525 questions
Question 1

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?



Answer : C


Question 2

Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?



Answer : B


Question 3

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.



Answer : B, C


Question 4

Which of the following heights of fence deters only casual trespassers?



Answer : A


Question 5

Which of the following is the practice of a domain name registrant using the five-day "grace period" (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain?



Answer : B


Question 6

Which of the following are symptoms of a virus attack on your computer?

Each correct answer represents a complete solution. Choose two.



Answer : A, B


Question 7

Which of the following malware spread through the Internet and caused a large DoS attack in

1988?



Answer : A


Page:    1 / 14   
Total 525 questions