giac GSLC Exam Questions

Questions for the GSLC were updated on : Nov 21 ,2025

Page 1 out of 38. Viewing questions 1-15 out of 567

Question 1

Which of the following is a computer file used in an operating system to map hostnames to IP
addresses?

  • A. LMHOSTS file
  • B. NSCD.CONF file
  • C. TMPFS file
  • D. HOSTS file
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following honeypots captures limited amounts of information, mainly transactional
data and some limited interaction?

  • A. Low-interaction
  • B. High-interaction
  • C. Network
  • D. Medium-interaction
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following can be performed to verify the effectiveness of a quality management
system?

  • A. Configuration auditing
  • B. Benchmarking
  • C. Project analysis
  • D. Quality audits
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following contains information that is read by a Web application whenever a user visits
a site?

  • A. PII
  • B. Cookie
  • C. Rootkit
  • D. DiD
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following is a structured review of the procurement process originated at the Plan
Procurements process?

  • A. Procurement document package
  • B. Administer Procurements process
  • C. Procurement auditing
  • D. Project Procurement Management
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following is an input of the close procurements process?

  • A. Organizational process asset updates
  • B. Procurement credentials
  • C. Project management plan
  • D. Closed procurements
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which is a computer system on the Internet that is expressly set up to attract and trap people who
attempt to penetrate other people's computer systems?

  • A. Honeynet
  • B. Honeypot
  • C. Honeytrap
  • D. Honeytoken
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following port numbers is used by the LDAP protocol when it is secured?

  • A. 335
  • B. 120
  • C. 442
  • D. 636
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following uses a variable-length Initialization Vector (IV), where the encrypted data
begins?

  • A. DES-OFB
  • B. DES-ECB
  • C. DES-CBC
  • D. DES-CFB
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

In which type of person-to-person attack does an attacker pretend to be someone else?

  • A. In Person Attack
  • B. Important User Posing
  • C. Impersonation
  • D. Third-Party Authorization
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

All of the following are the password cracking attacks performed by the cain tool except for which
one?

  • A. Brute force attack
  • B. Dictionary attack
  • C. DoS attack
  • D. Rainbow attack
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

What do spikes in a power line indicate?

  • A. Interference superimposed onto the power line
  • B. Momentary high voltage
  • C. Prolonged loss of power
  • D. Momentary low voltage
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks
except for which one?

  • A. Implement the IPP printing capability.
  • B. Conduct frequent scans for server vulnerabilities.
  • C. Install the upgrades of Microsoft service packs.
  • D. Implement effective firewalls.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following is a physical or logical subnetwork that contains and exposes external services
of an organization to a larger network, usually the Internet?

  • A. NAT
  • B. Firewall
  • C. DMZ
  • D. VLAN
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following is used to indicate that the project team has decided not to change the
project management plan to deal with a risk or is unable to identify any other suitable response
strategy?

  • A. Risk avoidance
  • B. Risk transference
  • C. Risk acceptance
  • D. Risk mitigation
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2