Want to pass your GIAC Security Leadership (GSLC) GSLC exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?
A. Network anti-spyware software
B. Protocol analyzers
C. Network anti-virus software
D. Site surveys
Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?
A. A risk audit is a review of all the risks that have yet to occur and what their probability of happening are.
B. A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.
C. A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.
D. A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.
You are responsible for network security at a defense contractor. You are very concerned about sensitive data not getting out of your network. You have specific concerns about employees or contractors sending out files via FTP, or even spyware sending out data. You have blocked and monitored ports (as many as you can) on your firewall, and of course, run an anti spyware package. Which of the following is another step you should take in preventing sensitive data from being sent out of your network without authorization?
A. Implement an IDS.
B. Utilize a DMZ firewall.
C. Block all employees from emailing outside your network.
D. Employ network wide anti virus.