GSLC Test Prep With Actual Answers.
Which of the following security concerns falls into the administrative type for access controls? - CORRECT ANSWER Answer: Monitoring
Reasoning: The administrative controls involve the actions, policies, and management of the control system, and include proced...
GSLC Test Prep With Actual Answers.
Which of the following security concerns falls into the administrative type for access controls? -
CORRECT ANSWER Answer: Monitoring
Reasoning: The administrative controls involve the actions, policies, and management of the control
system, and include procedures, hiring, security policies, monitoring, user management, and privilege
management. The other types are physical and technical.
What are the essential practices for identification? - CORRECT ANSWER Answer: Uniqueness,
nondescriptive, and
issuance
Reasoning: The essential practices of identification process are uniqueness, nondescriptive, and
issuance.
When using smart cards to aid in the authentication process, which integrated circuit design requires
ultraviolet light to erase the memory of the circuit? - CORRECT ANSWER Answer: EPROM
Reasoning: EPROM (Erasable programmable read-only memory) must use ultraviolet to erase memory.
EEPROM improves the process by using electricity instead of ultraviolet. PROM cannot be erased. RAM
supports memory retention by an independent power source.
When routers are used to filter packets through access lists, which type of access list will allow the
filtering to be based on upper-layer session information and allow the temporary connection to be
opened for IP traffic? - CORRECT ANSWER Answer: Reflexive
Reasoning: A standard access list will use the source IP address to perform packet filtering. Both the
source and destination IP addresses are used in an extended access list. Lock-andkey access lists will
automatically create lists to allow traffic from authenticated sources. Reflexive lists will allow IP packets
to be filtered based on upper-layer session information. A temporary connection can be opened for IP
traffic.
What is the most basic from of the Data Encryption Standard? - CORRECT ANSWER Answer: Electronic
Codebook Mode
Reasoning: Electronic Codebook Mode (ECB) is the most basic form of DES. Each 640bit block of text is
encrypted independently. It is generally used for very short messages.
, Traffic on the network is directed using which of the following perimeter devices? - CORRECT ANSWER
Answer: Routers
Reasoning: Router can be used on the perimeter to direct traffic between the trusted and untrusted
network. Firewalls will typically block traffic, while IDS/IPS devices will monitor traffic and make
decisions based on traffic types. Hubs are not considered perimeter devices.
What security implementation is used to delay an attack rather than prevent it? - CORRECT ANSWER
Answer: Screened Subnet
Reasoning: Defense-in-Depth solutions are used to delay an attack instead of preventing the attack. The
purpose of delaying the attack is to allow time to effectively apply countermeasures.
What is the hierarchical tree structure used in DNS called? - CORRECT ANSWER Answer: Domain
namespace
Reasoning: The domain namespace is a hierarchy naming tree structured use din DNS. The root of the
tree is managed by the InterNIC. Domains are any tree or subtree within the overall domain namespace.
What is the term used to recognize the function of a DNS server designated to handle queries for
resolving external DNS domain names by sending the request to another DNS server? - CORRECT
ANSWER Answer: DNS Forwarder
Reasoning: DNS Servers which send queries to other servers to resolve external or offsite DNs domain
names is called a forwarder.
Which of the following is a quantitative assessment used in risk management? - CORRECT ANSWER
Answer: Failure Modes and Effect Analysis
Reasoning: Risk assessments are either qualitative or quantitative. Quantitative assessments include
Spanning Tree Analysis and Failure Modes and Effect Analysis.
What IEEE standard covers the requirements for providing wireless support from 1-30 miles, typically in
MANs? - CORRECT ANSWER Answer: 802.16
Reasoning: IEEE 802.16 is the official standard for WiMAX which is commonly used as a 'last mile'
technology with a range of 1-10 miles and found commonly in MANs.
Which of the following is not a phase of the data life cycle? - CORRECT ANSWER Answer: Initiation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursewendo. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.