GIAC GSLC - GIAC Security Leadership Certification (GSLC) Exam

Page:    1 / 23   
Total 114 questions

Which of the following is an example of pseudonymous data?

  • A. Encrypting employee data with a private key before transmitting it for payroll processing
  • B. Using salted hashes to protect customer bank account data in a backend database
  • C. Collected poll results added together and displayed in total on a public website
  • D. Research analysis with names removed and replaced with a unique identifier for each participant


Answer : D

Using a network extraction approach for logging requires which of the following?

  • A. Scripts to parse multiple log formats
  • B. Sensors to capture mirrored traffic
  • C. System service configuration changes
  • D. System remote agents for log collection


Answer : A

What can be determined from the NIST SP800-53 related screenshot below?

  • A. Previous Logon (Access) Notification is required in all baselines
  • B. Account Management must be implemented before Unsuccessful Logon Attempts
  • C. Session Lock has the most control enhancements
  • D. Account Management must be implemented before Separation of Duties


Answer : D

S/MIME provides encryption for which of the following?

  • A. Email
  • B. VPN
  • C. Network authentication
  • D. Web applications


Answer : A

At which stage of the Security Awareness Maturity Model is annual training first implemented?

  • A. Long-term sustainment and cultural change
  • B. Metrics framework
  • C. Compliance-focused
  • D. Promoting awareness and behavioral change


Answer : D

Page:    1 / 23   
Total 114 questions