DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Boost Your GIAC Exam Preparation with GCPM Practice Tests

SPOTO's GIAC GCPM exam questions offer a strategic advantage for aspiring GIAC Certified Project Managers (GCPM). Dive into comprehensive exam questions and answers crafted to enhance your understanding of technical project management methodologies and implementation strategies. With SPOTO's test questions and exam preparation materials, master critical skill sets such as effective communication, time management, cost control, quality assurance, procurement, and risk management in IT projects and application development. Access valuable study materials and exam resources curated to help you pass successfully. Engage in realistic mock exams to simulate the exam environment and boost your confidence. Prepare with SPOTO and become a certified GCPM professional equipped to make projects successful and drive organizational excellence.
Take other online exams

Question #1
Which of the following are outputs of the Perform Integrated Change control process?
A. Change request status update
B. Project document update
C. Project management plan update
D. Work performance information
View answer
Correct Answer: ABC

View The Updated GCPM Exam Questions

SPOTO Provides 100% Real GCPM Exam Questions for You to Pass Your GCPM Exam!

Question #2
is true?
A. It is a rule list containing access control entries
B. It specifies whether an audit activity should be performed when an object attempts to access a resource
C. It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object
D. It is a unique number that identifies a user, group, and computer account
View answer
Correct Answer: C
Question #3
policy is true?
A. It provides information about new viruses
B. It is a method used to authenticate users on a network
C. It identifies the level of confidentiality of information
D. It is a method for securing database servers
View answer
Correct Answer: C
Question #4
Which of the following are advantages of client-side JavaScript?Each correct answer represents a complete solution. Choose two.
A. It is fast
B. It provides graphical components
C. It is secure
D. It provides form-validation at client side
View answer
Correct Answer: AD
Question #5
Examine the code snippet below. What will be the contents of the variable ?€?i?€? during the loops first iteration?
A. is
B. 1
C. 0
D. Python
View answer
Correct Answer: C
Question #6
The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by theInformation Security Officer?
A. Carry out a risk analysis
B. Formulate information security policy
C. Set up monitoring
D. Carry out an evaluation
View answer
Correct Answer: A
Question #7
Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the followingSteganography methods is Victor using to accomplish the task?
A. The distortion technique
B. The substitution technique
C. The cover generation technique
D. The spread spectrum technique
View answer
Correct Answer: A
Question #8
John enters a URL http://www.cisco.com/web/learning in the web browser. A web page appears after he enters the URL. Which of the following protocols is used to resolve www.cisco.com into the correct IP address?
A. DNS
B. SMTP
C. DHCP
D. ARP
View answer
Correct Answer: A
Question #9
John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. TheNewAccount page contains several TextBox controls that accept users' personal details such as username, password, confirm password, first name, last name, home address,
A. CompareValidator
B. RequiredFieldValidator
C. RangeValidator
D. RegularExpressionValidator
View answer
Correct Answer: BD
Question #10
Which of the following techniques is described in the statement below?"It is used to verify whether a particular work can best be accomplished by the project team or must be purchased from outside sources."
A. Expert judgment
B. Make-or-Buy analysis
C. Contract type
D. Risk analysis
View answer
Correct Answer: B
Question #11
Which of the following documents is developed along the risk management processes to monitor and control risks?
A. Fault tree
B. Risk mitigation
C. Decision tree
D. Risk register
View answer
Correct Answer: D
Question #12
You are configuring a public access wireless connection. Which of the following is the best way to secure this connection?
A. Not broadcasting SSID
B. Using WPA encryption
C. Implementing anti virus
D. Using MAC filtering
View answer
Correct Answer: B
Question #13
When accessing the hard drive directly, how would the character ?€?B?€? be stored?
A. 01000010
B. /x42
C. 66
D. B
View answer
Correct Answer: A
Question #14
What is the cause of the error shown below?
A. A syntax error
B. The re module hasn?€?t been imported
C. A bad file name
D. The stdin module hasn?€?t been imported
View answer
Correct Answer: B
Question #15
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?
A. Containment
B. Preparation
C. Recovery
D. Identification
View answer
Correct Answer: A
Question #16
As pan or a penetration lest, your team is tasked with discovering vulnerabilities that could be exploited from an inside threat vector. Which of the following activities fall within that scope?
A. SQL injection attacks against the hr intranet website
B. A competitor's employee's scanning the company's website
C. Wireless "war driving" the company manufacturing site
D. Running a Nessus scan from the sales department network
E. B, C, and D
F. A, B
G. B and D
H. A and D
View answer
Correct Answer: C
Question #17
Victor wants to send an encrypted message to his friend. He is using a steganography technique to accomplish his task. He takes a cover object and changes it accordingly to hide information.This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following steganography methods is Victor using to accomplish his task?
A. The distortion technique
B. The substitution technique
C. The cover generation technique
D. The spread spectrum technique
View answer
Correct Answer: A
Question #18
Georgina works as a Software Developer for BlueChip Inc. She develops an application named App1 using Visual Studio .NET. The company wants her to deploy App1 to a customer's laptop. Georgina creates an assembly named Assembly1 to be stored in theGlobal Assembly Cache so that the Common Language Runtime (CLR) can locate and bind Assembly1.As the application executes, the CLR locates the path of Assembly1 through the codebase setting. But, it finds no element in the app.config file, and fails to b
A. Previously loaded assemblies
B. The application base or root directory
C. The Gacutil
D. Sub-directories in the application's root directory
E. The culture attribute of the assembly
F. The correct version of the assembly
G. The assembly's name
View answer
Correct Answer: BDEG
Question #19
Which of the following processes formally permits the initiation of a project and marks the kickoff for all consequent development activities to begin?
A. Develop project scope statement
B. Develop project charter
C. Develop project management plan
D. Develop project team
View answer
Correct Answer: B
Question #20
You have connected to a Windows system remotely and have shell access via netcat.While connected to the remote system you notice that some Windows commands work normally while others do not An example of this is shown in the picture below Which of the following best describes why tins is happening?
A. Netcat cannot properly interpret certain control characters or Unicode sequences
B. The listener executed command
C. Another application is already running on the port Netcat is listening on
D. TheNetcat listener is running with system level privileges
View answer
Correct Answer: D
Question #21
Mark works as a Programmer for InfoTech Inc. He develops a class named Data that imports all the required packages. The class Data uses a method named PrintData(), which uses a method that checks whether the caller has a BeanUser security role. Which of the following code of the method PrintData() will satisfy the requirement?
A. public void PrintData() { @DeclareRoles("BeanUser") @Resource SessionContext ctx; @RolesAllowed("BeanUser") Principal caller = ctx
B. public void PrintData() {@DeclareRoles("BeanUser") @Resource SessionContext ctx; @RolesAllowed("BeanUser") Principal caller = ctx
C. public void PrintData() {@DeclareRoles("BeanUser") @Resource SessionContext ctx; @RolesAllowed("BeanUser") Principal caller = ctx
D. public void PrintData() {@DeclareRoles("BeanUser") @Resource SessionContext ctx; @RolesAllowed("BeanUser") Principal caller = ctx
View answer
Correct Answer: C
Question #22
Fill in the blank with the appropriate layer name of the OSI model.Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.
A. transport
View answer
Correct Answer: A
Question #23
Which of the following is the element used in the technology of encrypting and decrypting the text in cryptography?
A. Cipher
B. Key
C. Plaintext
D. Encryption
View answer
Correct Answer: B
Question #24
Which of the following methods backs up all changes made since the last full or normal backup?
A. Half backup
B. Incremental backup
C. Differential backup
D. Full backup
View answer
Correct Answer: C
Question #25
Which of the following attacks saturates network resources and disrupts services to a specific computer?
A. Teardrop attack
B. Polymorphic shell code attack
C. Denial-of-Service (DoS) attack
D. Replay attack
View answer
Correct Answer: C
Question #26
A penetration tester wishes to stop the Windows Firewall process on a remote host runningWindows Vista She issues the following commands:
A. The kernel prevented the command from being executed
B. The user does not have the access level needed to stop the firewall
C. The sc command needs to be passed the IP address of the target
D. The remote server timed out and did not complete the command
View answer
Correct Answer: C
Question #27
Which of the following statements are true?Each correct answer represents a complete solution. Choose all that apply.
A. StringBuffer is thread safe, but StringBuilder is not
B. The String class is final
C. StringBuilder offers faster performance than StringBuffer
D. The size of the String can be obtained using the length property
View answer
Correct Answer: ABC
Question #28
By default Active Directory Controllers store password representations in which file?
A. %system roots
B. %System roots /ntds\ntds
C. %System roots /ntds\sam
D. %System roots /ntds\sam
View answer
Correct Answer: A
Question #29
Which of the following is in the output when program1.py shown below is executed?
A. TypeError: cannot concatenate ?€?str?€? and ?€?int?€? objects
B. NameError: name ?€?c?€? is not defined
C. ac
D. 15
View answer
Correct Answer: B
Question #30
You work as a project manager for HRM Inc. You are concerned with defining and controlling what is or is not included in the project. Which of the following processes will you use to accomplish the above task?
A. Project communications management
B. Project reporting structure
C. Project scope management
D. Risk management
View answer
Correct Answer: C
Question #31
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
A. Containment
B. Recovery
C. Identification
D. Eradication
View answer
Correct Answer: D
Question #32
You work as an Information Security Manager for uCertify Inc. You are working on asset management. You have been assigned the task to secure information labeling and handling within the organization. Which of the following controls of the ISO standard is concerned with information labeling and handling?
A. Control A
B. Control A
C. Control A
D. Control A
View answer
Correct Answer: C
Question #33
You work as a Security Administrator for uCertify Inc. You have been assigned a task to implement information classification levels. You want to put the highly sensitive documents that should only be accessed by few people of the organization. In which of the following information classification levels should you put those documents?
A. Department specific
B. High security levels
C. Not to be copied
D. Classified
View answer
Correct Answer: B
Question #34
You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company.Which of the following can be a cause for making the network vulnerable? (Choose two)
A. Use of well-known code
B. Use of uncommon code
C. Use of uncommon software
D. Use of more physical connections
View answer
Correct Answer: AD
Question #35
You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network.After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?
A. False Positive
B. True Negative
C. False Negative
D. True Positive
View answer
Correct Answer: C
Question #36
You work as a Network Administrator for Infonet Inc. The company has a Windows Server2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network toIPv6-enabled network. Now you want to enable DNS Server to perform lookups inGlobalNames Zone. Which of the following commands will you use to accomplish the task?
A. Dnscmd /config /enableglobalnames 1
B. Dnscmd /config /enableglobalnamessupport 0
C. Dnscmd /config /enableglobalnamessupport 1
D. Dnscmd /config /globalnamesqueryorder 0
View answer
Correct Answer: C
Question #37
In which of the following forecasting techniques is an attempt made to develop forecasts through group consensus?
A. Time series method
B. Judgmental forecasting method
C. Delphi technique
D. Casual/econometric method
View answer
Correct Answer: C
Question #38
You work as a Software Developer for ABC Inc. You develop an application using VisualStudio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application.Which of the following events will you use in the application code to accomplish the task?
A. EndPrint
B. QueryPageSettings
C. PrintPage
D. BeginPrint
View answer
Correct Answer: C
Question #39
John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. TheNewAccount page contains several TextBox controls that accept users' personal details such as username, password, confirm password, first name, last name, home address,
A. CompareValidator
B. RequiredFieldValidator
C. RangeValidator
D. RegularExpressionValidator
View answer
Correct Answer: BD
Question #40
Mark works as a Network Administrator for NetTech Inc. The company has a Windows2000 domain-based network. Users report that they are unable to log on to the network.Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
A. SYN attack
B. Spoofing
C. PING attack
D. Brute force attack
View answer
Correct Answer: D
Question #41
In the screen shot below, which selections would you need click in order to intercept and alter all http traffic passing through OWASP ZAP?
A. Trap response and continue
B. Set Break and Continue
C. Trap request and continue
D. Continue and drop
View answer
Correct Answer: B
Question #42
Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?
A. Spoofing
B. File integrity auditing
C. Reconnaissance
D. Shoulder surfing
View answer
Correct Answer: B
Question #43
Which of the following are outputs of the Perform Quality Control process?
A. Quality metrics
B. Validated deliverables
C. Validated changes
D. Project document updates
View answer
Correct Answer: BCD
Question #44
John works as a Programmer for We-are-secure Inc. On one of his routine visits to the company, he noted down the passwords of the employees while they were typing them on their computer screens.Which of the following social engineering attacks did he just perform?
A. Shoulder surfing
B. Important user posing
C. Dumpster diving
D. Authorization by third party
View answer
Correct Answer: A
Question #45
You work as a Java Programmer for JavaSkills Inc. You are working with the Linux operating system. Nowadays, when you start your computer, you notice that your OS is taking more time to boot than usual. You discuss this with your Network Administrator. He suggests that you mail him your Linux bootup report.Which of the following commands will you use to create the Linux bootup report?
A. touch bootup_report
B. dmesg > bootup_report
C. dmesg | wc
D. man touch
View answer
Correct Answer: B
Question #46
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?
A. Nikto
B. Sniffer
C. Snort
D. Dsniff
View answer
Correct Answer: A
Question #47
Amy works as a project manager for HRM Inc. She has to develop a visual diagram which can depict the resources that will be used within the project. Which of the following diagrams will Amy create to accomplish the task?
A. RACI
B. Gantt chart
C. WBS
D. RBS
View answer
Correct Answer: D
Question #48
How does OWASP ZAP function when used for performing web application assessments?
A. It is a non-transparent proxy that sits between your web browser and the targetapplication
B. It is a transparent policy proxy that sits between Java servers and |SP web pages
C. It is a non-transparent proxy that passively sniffs network traffic for HTTPvulnerabilities
D. It is a transparent proxy that sits between a target application and the backenddatabase
View answer
Correct Answer: D
Question #49
Hannah works as a Programmer in a college of Information Technology. The company uses Visual Studio .NET as its application development platform. The Dean of the college wants to obtain the performance report of each student. Hannah develops an application named StudentPerformanceReport by using Visual C# .NET. This application uses a SQLServer database named Database1 and a stored procedure named PROC1. PROC1 executes a query that returns the internal assessment result of each student.Hannah uses a TextBox
A. AssessmentText
B. AssessmentText
C. AssessmentText
D. AssessmentText
View answer
Correct Answer: BC
Question #50
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?
A. Hunt
B. Ettercap
C. Alchemy Remote Executor
D. Mendax
View answer
Correct Answer: D
Question #51
Variable ?€traffic?€ contains a Scapy packet list. A programmer runs the following command: p1=traffic[1]Which of the following describes the contents of p1, with respect to the ?€traffic?€ packet list?
A. All Ethernet layer frames
B. The contents of the second packet
C. TCP streams with a session ID of 1
D. The data stored from the first byte onward
View answer
Correct Answer: A
Question #52
You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?
A. Use Incident handling
B. Use OODA loop
C. Use Information assurance
D. Use SMART model
View answer
Correct Answer: D
Question #53
Which of the following protocols is used with a tunneling protocol to provide security?
A. EAP
B. FTP
C. IPX/SPX
D. IPSec
View answer
Correct Answer: D
Question #54
A client with 7200 employees in 14 cities (all connected via high speed WAN connections) has suffered a major external security breach via a desktop which cost them more than SI72.000 and the loss of a high profile client. They ask you to perform a desktop vulnerability assessment to identify everything that needs to be patched. Using Nessus you find tens of thousands of vulnerabilities that need to be patched. In the report you find workstations running several Windows OS versions and service pack levels,
A. The client should standardize their desktop software
B. The client should eliminate workstations to reduce workload
C. The client should hire more people to catch up on patches
D. The client should perform monthly vulnerability assessments
View answer
Correct Answer: C
Question #55
Which of the following are ensured by the concept of integrity in information system security?Each correct answer represents a complete solution. Choose two.
A. Unauthorized modifications are not made by authorized users
B. Data modifications are not made by an unauthorized user or process
C. The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented
D. The systems are up and running when they are needed
View answer
Correct Answer: AB
Question #56
John works as a Software Developer for DawnStar Inc. He creates a class, namedMyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name. Which of the following tools will he use to accomplish the task?
A. Installutil
B. Gacutil
C. Sn
D. Al
View answer
Correct Answer: C
Question #57
Which of the following types of firewall functions at the Session layer of OSI model?
A. Circuit-level firewall
B. Switch-level firewall
C. Packet filtering firewall
D. Application-level firewall
View answer
Correct Answer: A
Question #58
In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?Each correct answer represents a complete solution. Choose all that apply.
A. False alert
B. False illusion
C. False generation
D. False positives
View answer
Correct Answer: AD
Question #59
What is the output of the following when executed in a Python shell?
A. [[1, 2, 2
B. [[1, 2], [3, 4], [5, 6]]
C. [[1, 2], [3, 4]]
D. [[1, 2, 2
View answer
Correct Answer: D
Question #60
You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?
A. Implement a network based IDS
B. Implement a passive IDS
C. Implement a stateful packet inspection firewall
D. Implement a honey pot
View answer
Correct Answer: D
Question #61
You are a new Project Manager who has been entrusted with a project. You have been directing and managing the execution of your project. Which of the following is the most likely outcome as part of this phase of the project?
A. Approved Deliverables
B. Lessons learned
C. Expert Judgment
D. Project Charter
View answer
Correct Answer: A
Question #62
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.A firewall has been configured on the network. You configure a filter on the router. You operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?
A. 25
B. 80
C. 20
D. 21
View answer
Correct Answer: A
Question #63
Harry works as a Software Developer for SoftTech Inc. He has developed a Java application to perform various SQL statements such as INSERT, UPDATE, etc., against a database table named Employee. He has used the executeUpdate() method to perform various SQL queries and to know the exact affected rows in the database if any of the operations is performed against the database table.Which of the following types of values is returned by this method?
A. Double
B. Integer
C. Float
D. String
View answer
Correct Answer: B
Question #64
security systemare true?Each correct answer represents a complete solution. Choose two.
A. It requires a password only once to authenticate users
B. It requires a new password every time a user authenticates himself
C. It generates passwords by using either the MD4 or MD5 hashing algorithm
D. It generates passwords by using Kerberos v5
View answer
Correct Answer: BC
Question #65
Which of the following is also known as the 'Code for Information Security'?
A. ISO/IEC 20002 standard
B. ISO/IEC 27001:2005 standard
C. ISO/IEC 27002:2005 standard
D. ISO/IEC 20000 standard
View answer
Correct Answer: C
Question #66
While performing an assessment on a banking site, you discover the following link: hnps://mybank.com/xfer.aspMer_toMaccount_number]&amount-[dollars]Assuming authenticated banking users can be lured to your web site, which crafted html tag may be used to launch a XSRF attack?
A.
B. alert('hnps:/'mybank
C. document
D.
View answer
Correct Answer: C
Question #67
Which of the following file systems supports the hot fixing feature?
A. FAT16
B. exFAT
C. FAT32
D. NTFS
View answer
Correct Answer: D
Question #68
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?Each correct answer re
A. Names of the victims
B. Date and time of incident
C. Nature of harassment
D. Location of each incident
View answer
Correct Answer: ABD
Question #69
Which of the following is a source port forwarder and redirector tool?
A. Fpipe
B. NMAP
C. SuperScan
D. NSLOOKUP
View answer
Correct Answer: A
Question #70
Which of the following methods can be invoked from the ejbStore() method of an entity bean class?Each correct answer represents a complete solution. Choose all that apply.
A. getPrimaryKey()
B. getUserTransaction()
C. getRollbackOnly()
D. isCallerInRole()
E. getEJBObject()
View answer
Correct Answer: ACDE
Question #71
Tony works as a Software Developer for TechNet Inc. He creates a satellite assembly namedSatAssembly1. He wants to install SatAssembly1 in the global assembly cache. Therefore, he compiles the assembly by using the Al.exe tool and signs SatAssembly1. Which of the following possible tools will Tony use to sign SatAssembly1?Each correct answer represents a complete solution. Choose two.
A. Installer tool
B. File Signing tool
C.
D. Strong Name tool
View answer
Correct Answer: BC
Question #72
Mark works as a project manager for HRM Inc. He has to identify the internal and external stakeholders who will interact and influence the overall outcome of the project. Which of the following process groups will help him to accomplish the task?
A. Monitoring and Controlling
B. Executing
C. Planning
D. Initiating
View answer
Correct Answer: D
Question #73
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
A. SHA
B. AES
C. MD5
D. DES
View answer
Correct Answer: C
Question #74
Which of the following are tunneling protocols?Each correct answer represents a complete solution. Choose two.
A. NNTP
B. SMTP
C. L2TP
D. PPTP
View answer
Correct Answer: CD
Question #75
John works as a Web Developer for ProLabs Inc. He develops an ASP.NET application, namedMyWebApp1, using Visual Studio .NET. One of the pages in the application is named asPage1.aspx, which does not need to maintain session state. To improve the performance of the application, John wants to disable session state for Page1. Which of the following actions will he take to accomplish the task?
A. Set the EnableViewState attribute in the @ Page directive to false
B. Set the DisableSessionState attribute in the @ Page directive to true
C. In the sessionState configuration section of the application's Web
D. Set the EnableSessionState attribute in the @ Page directive to false
View answer
Correct Answer: D
Question #76
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:Gathering information -Determining the network range -Identifying active systems -Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
A. ARIN
B. APNIC
C. SuperScan
D. RIPE
View answer
Correct Answer: C
Question #77
You work as a Windows Application Developer for ABC Inc. The company uses VisualStudio .NET 2008 as its application development platform. You are creating a WindowsForms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color. What will you do?
A. Set the control's DrawMode property to OwnerDrawText, and then implement a custom DrawNode event handler
B. Set the control's DrawMode property to OwnerDrawAll, and then implement a custom DrawNode event handler
C. Write a code segment in the DrawNode event handler to give the highlight color
D. Override the OnPaint method
View answer
Correct Answer: A
Question #78
The following JSP scriptlet is given.<% response.setContentType("text/html; charset=ISO-8859-1"); %>Which of the following directives is the equivalent directive for the scriptlet given above?
A. <%@ include contentType="text/html; pageEncoding=ISO-8859-1" %>
B. <%@ include contentType="text/html; charset=ISO-8859-1" %>
C. <%@ page contentType="text/html; charset=ISO-8859-1" %>
D. <%@ taglib contentType="text/html; pageEncoding=ISO-8859-1" %>
View answer
Correct Answer: C
Question #79
Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?
A. Honeypot
B. Internet bot
C. Crawler
D. Spider
View answer
Correct Answer: A
Question #80
Which of the following type of file systems is not supported by Linux kernel?
A. vFAT
B. NTFS
C. HFS
D. FAT32
View answer
Correct Answer: D
Question #81
Which of the following is described in the statement below?"It is defined as the work element that must be carefully monitored, documented, and managed to make the success of an organization, program, or project."
A. High alert activity
B. Critical activity
C. Red rated activity
D. Action items
View answer
Correct Answer: B
Question #82
Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?
A. Application protocol-based intrusion detection system (APIDS)
B. Network intrusion detection system (NIDS)
C. Protocol-based intrusion detection system (PIDS)
D. Host-based intrusion detection system (HIDS)
View answer
Correct Answer: D
Question #83
You work as a Network Administrator for Net World International. The company has aWindows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops runWindows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared for the
A. Install PEAP-MS-CHAP v2
B. Install Service Pack 1
C. Enable WEP
D. Install EAP-TLS
View answer
Correct Answer: C
Question #84
You work as a Software Developer for ABC Inc. You develop an application using VisualStudio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application.Which of the following events will you use in the application code to accomplish the task?
A. EndPrint
B. QueryPageSettings
C. PrintPage
D. BeginPrint
View answer
Correct Answer: C
Question #85
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?Each correct answer represents a complete solution. Choose all that apply.
A. Buffer-overflow attack
B. Brute force attack
C. Dictionary-based attack
D. Password guessing
E. Social engineering
F. Zero-day attack
G. Denial-of-service (DoS) attack
H. Rainbow attack
View answer
Correct Answer: BCDEH
Question #86
Which of the following are the sub-elements of environmental security?Each correct answer represents a complete solution. Choose all that apply.
A. To prevent or respond to environmentally caused conflicts
B. To protect and assist environment from a material's potential
C. To prevent or repair military damage to the environment
D. To protect the environment due to its inherent moral value
View answer
Correct Answer: ACD
Question #87
You have detected what appears to be an unauthorized wireless access point on your network. However this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal. What is this called?
A. Buesnarfing
B. DOS
C. The evil twin attack
D. WAP cloning
View answer
Correct Answer: C
Question #88
Third-party Python modules like Scapy and Beautiful Soup are used for what purpose?
A. Generating a compiled
B. Parsing and interacting with network traffic
C. Debugging Python programs
D. Obfuscating code
View answer
Correct Answer: B
Question #89
Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?
A. WEP
B. WPA
C. L2TP
D. IPSec
View answer
Correct Answer: A
Question #90
You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?
A. Implement a strong password policy
B. Implement a honey pot
C. Implement a strong firewall
D. Implement network based anti virus
View answer
Correct Answer: B
Question #91
You work as a Software Developer for NewTech Inc. You want to configure the deployment descriptor so as to specify the error pages used in the FORM based authentication. Which of the following elements will you use to accomplish the task?
A. The sub-element of the element
B. The sub-element of the element
C. The sub-element of the element
D. The sub-element of the element
View answer
Correct Answer: D
Question #92
Analyze the command output below, what action is being performed by the tester?
A. Displaying a Windows SAM database
B. Listing available workgroup services
C. Discovering valid user accounts
D. Querying locked out user accounts
View answer
Correct Answer: C
Question #93
Which of the following mechanisms is closely related to authorization?
A. Sending data so that no one can alter it on the way
B. Allowing access to a particular resource
C. Verifying username and password
D. Sending secret data such as credit card information
View answer
Correct Answer: B
Question #94
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET2005 as its application development platform. You create a Web service application using.NET Framework. The Web service provides confidential data of employees to applications that manage access to company facilities. The Web service is accessible by using TCP and is sheltered by using WSE 3.0. The company has implemented fingerprint readers to grant employees access to the facilities. All the captured images of the employees' f
A. Configure the Web service to use base64 encoding to pass the binary fingerprint image
B. Create a SOAP extension to manage encryption for the message
C. Configure the Web service to use Message Transmission Optimization Mechanism to pass the binary fingerprint image
D. Create a SOAP filter to manage encryption for the message
View answer
Correct Answer: C
Question #95
You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues:The information has proved beneficial to another company.The other company is located about 340 feet away from your office.The other company is also using wireless network.The bandwidth of your network has degraded to a g
A. A piggybacking attack has been performed
B. The information is traced using Bluebugging
C. A DOS attack has been performed
D. A worm has exported the information
View answer
Correct Answer: A
Question #96
Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework.He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
A. PPP
B. FTP
C. PGP
D. PPTP
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: