Questions for the GSLC were updated on : Nov 21 ,2025
Which of the following is a computer file used in an operating system to map hostnames to IP
addresses?
D
Which of the following honeypots captures limited amounts of information, mainly transactional
data and some limited interaction?
A
Which of the following can be performed to verify the effectiveness of a quality management
system?
D
Which of the following contains information that is read by a Web application whenever a user visits
a site?
B
Which of the following is a structured review of the procurement process originated at the Plan
Procurements process?
C
Which of the following is an input of the close procurements process?
C
Which is a computer system on the Internet that is expressly set up to attract and trap people who
attempt to penetrate other people's computer systems?
B
Which of the following port numbers is used by the LDAP protocol when it is secured?
D
Which of the following uses a variable-length Initialization Vector (IV), where the encrypted data
begins?
C
In which type of person-to-person attack does an attacker pretend to be someone else?
C
All of the following are the password cracking attacks performed by the cain tool except for which
one?
C
What do spikes in a power line indicate?
B
All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks
except for which one?
A
Which of the following is a physical or logical subnetwork that contains and exposes external services
of an organization to a larger network, usually the Internet?
C
Which of the following is used to indicate that the project team has decided not to change the
project management plan to deal with a risk or is unable to identify any other suitable response
strategy?
C