显示标签为“GIAC”的博文。显示所有博文
显示标签为“GIAC”的博文。显示所有博文

2014年1月28日星期二

Pass4Test offre une formation sur GIAC GSSP-NET matériaux examen

Bien qu'il ne soit pas facile à réussir le test GIAC GSSP-NET, c'est très improtant à choisir un bon outil de se former. Pass4Test a bien préparé les documentatinos et les exercices pour vous aider à réussir 100% le test. Pass4Test peut non seulement d'être une assurance du succès de votre test GIAC GSSP-NET, mais encore à vous aider d'économiser votre temps.

Le guide d'étude sorti de Pass4Test comprend les expériences résumées par nos experts, les matériaux et les Q&As à propos de test Certification GIAC GSSP-NET. Notre bonne réputation dans l'industrie IT sera une assurance 100% à réussir le test GIAC GSSP-NET. Afin de vous permettre de choisir Pass4Test, vous pouvez télécharger gratuitement le démo de Q&A tout d'abord.

Code d'Examen: GSSP-NET
Nom d'Examen: GIAC (GIAC GIAC Secure Software Programmer - C#.NET )
Questions et réponses: 491 Q&As

Pass4Test peut vous fournir un raccourci à passer le test GIAC GSSP-NET: moins de temps et efforts dépensés. Vous trouverez les bonnes documentations de se former dans le site Pass4Test qui peut vous aider efficacement à réussir le test GIAC GSSP-NET. Si vous voyez les documentations dans les autres sites, c'est pas difficile à trouver qu''elles sont venues de Pass4Test, parce que lesquelles dans Pass4Test sont le plus complété et la mise à jour plus vite.

Le suucès n'est pas loin de vous une fois que vous choisissez le produit de Q&A GIAC GSSP-NET de Pass4Test.

Vous pouvez télécharger le démo gratuit pour prendre un essai. Vous aurez plus confiance sur Pass4Test. N'hésitez plus à choisir la Q&A GIAC GSSP-NET comme votre guide d'étude.

Le Pass4Test est un site qui peut offrir les facilités aux candidats et aider les candidats à réaliser leurs rêve. Si vous êtes souci de votre test Certification, Pass4Test peut vous rendre heureux. La haute précision et la grande couverture de la Q&A de Pass4Test vous aidera pendant la préparation de test. Vous n'aurez aucune raison de regretter parce que Pass4Test réalisera votre rêve.

Pass4Test a une grande équipe composée des experts d'expérience dans l'industrie IT. Leurs connaissances professionnelles et les recherches font une bonne Q&A, qui vous permet à passer le test GIAC GSSP-NET. Dans Pass4Test, vous pouvez trouver une façon plus convenable à se former. Les resources de Pass4Test sont bien fiable. Choisissez Pass4Test, choisissez un raccourci à réussir le test GIAC GSSP-NET.

GSSP-NET Démo gratuit à télécharger: http://www.pass4test.fr/GSSP-NET.html

NO.1 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its
application development platform. You create an application for the company. You need to validate the
phone number passed to a class as a parameter in the application. Which of the following is the most
effective way to verify that the format of the data matches a phone number.?
A. Regular expressions
B. Nested If statements
C. Use the String.Length property
D. A try/catch block
Answer: A

GIAC   GSSP-NET examen   GSSP-NET   GSSP-NET   certification GSSP-NET

NO.2 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application
development platform. You create a class library using the .NET Framework. The library will be used to
open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust
permission. You write down the following code segments for the socket connections:
SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);
permission.Assert();
A number of the applications that use the class library may not have the necessary permissions to open
the network socket connections. Therefore, you are required to withdraw the assertion. Which of the
following code segments will you use to accomplish the task?
A. permission.PermitOnly();
B. CodeAccessPermission.RevertDeny();
C. permission.Deny();
D. CodeAccessPermission.RevertAssert();
E. permission.Demand();
Answer: D

certification GIAC   GSSP-NET   certification GSSP-NET   GSSP-NET examen   GSSP-NET

NO.3 Which of the following session and instancing modes will you set if you require a sessionfull binding
and want to create a new instance object for each client request?
A. Set SessionMode to Allowed and IntsanceMode to PerSession.
B. Set SessionMode to Required and IntsanceMode to Single.
C. Set SessionMode to Required and IntsanceMode to PerCall.
D. Set SessionMode to Allowed and IntsanceMode to PerCall.
Answer: C

GIAC examen   certification GSSP-NET   GSSP-NET   GSSP-NET

NO.4 In .NET Framework 3.5, you can create and access values that persist from one application session to
another. What are these values called?
A. Objects
B. Settings
C. Properties
D. Attributes
Answer: B

GIAC   GSSP-NET examen   GSSP-NET   GSSP-NET examen   GSSP-NET examen   GSSP-NET examen

NO.5 You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its
application development platform. You have recently finished development of an ASP.NET Web
application using the .NET Framework 3.5. You host the application on a Web farm that consists of three
Web servers. You should configure the ASP.NET application for session state to meet the following
requirements:
l Session state data should not be lost if a server fails.
l Session state must be maintained across browser requests by the same user.
You are required to configure the Web.config file to meet these requirements. Which of the following
configurations will you use?
A. <sessionState mode="StateServer"/>
B. <sessionState mode="InProc"/>
C. <sessionState mode="Custom"/>
D. <sessionState mode="SQLServer"/>
Answer: D

GIAC examen   GSSP-NET   GSSP-NET examen   GSSP-NET   GSSP-NET

NO.6 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its
application development platform. You create an ASP.NET Web application using .NET Framework 3.5.
You create a Web form in the application that permits users to provide personal information. You add a
DropDownList control to the Web form to retrieve the residential status of users. The default item that the
DropDownList control displays is the "Select Country" option. You have to ensure that users select a
country other than the default option. Which of the following validation controls should you use to
accomplish this task?
A. RangeValidator
B. RequiredFieldValidator
C. CustomValidator
D. RegularExpressionValidator
Answer: B

GIAC   certification GSSP-NET   GSSP-NET   GSSP-NET   GSSP-NET

NO.7 Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its
application development platform. He creates an application using .NET Framework. He wants to encrypt
all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
A. PPP
B. FTP
C. PPTP
D. PGP
Answer: D

GIAC   GSSP-NET examen   certification GSSP-NET   GSSP-NET   GSSP-NET   GSSP-NET

NO.8 Session variables can be any valid __________.
A. .NET Framework type
B. Integer type
C. SessionStateItemCollection object
D. Object type
Answer: A

GIAC   GSSP-NET   GSSP-NET

NO.9 You work as a Software Developer for ABC Inc. The company has several branches worldwide. The
company uses Visual Studio .NET 2005 as its application development platform. You are creating an
application using .NET Framework 2.0. The application will be used by all the branches of the company.
You are using the CompareInfo class for culture-sensitive string comparisons. You write the following
code in the application:
String s1 = "C rtify";
String s2 = "c rtify";
String s3 = "c rtify";
You need to compare the s1 string with the s2 string and ensure that the string comparison must ignore
case. Which of the following code segments will you use to accomplish the task?
A. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.IgnoreCase));
B. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.None));
C. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.Ordinal));
D. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.OrdinalIgnoreCase));
Answer: A

GIAC   GSSP-NET   GSSP-NET   certification GSSP-NET   GSSP-NET

NO.10 You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its
application development platform. You create an ASP.NET Web application using the .NET
Framework 3.5. You want to use a HTTP module called on each and every request made by the
application. It is called as part of the ASP.NET request pipeline. It has right to access life-cycle events
throughout the request. You also want to ensure that the HTTP module allows a user to inspect incoming
and outgoing requests and take appropriate action based on the request. What will be the correct order to
create the HTTP module?
A.
Answer: A

GIAC   GSSP-NET examen   certification GSSP-NET   GSSP-NET   GSSP-NET

NO.11 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its
application development platform. You have recently finished development of a Windows application
using .NET Framework. Users report that the application is not running properly. When the users try to
complete a particular action, the following error message comes out:
Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,
PublicKeyToken=29b5ad26c9de9b95'.
You notice that the error occurs as soon as the application tries to call functionality in a serviced
component that was registered by using the following command:
regsvcs.exe myservices.dll
You must make sure that the application can call the functionality in the serviced component with no
exceptions being thrown. What will you do to accomplish this task?
A. Run the command line tool: regasm.exe myservices.dll.
B. Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.
C. Run the command line tool: gacutil.exe /i myservices.dll.
D. Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.
Answer: C

GIAC examen   GSSP-NET examen   GSSP-NET examen   GSSP-NET

NO.12 You work as a Software Developer for Mansoft Inc. You create an application and use it to create code
access security policies. Which of the following tools will you use to examine and modify code access
security policies from a batch file?
A. Tlbimp.exe
B. GacUtil.exe
C. Sn.exe
D. Caspol.exe
E. StoreAdm.exe
Answer: D

GIAC   GSSP-NET   GSSP-NET   GSSP-NET   GSSP-NET examen   GSSP-NET

NO.13 Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server
that hosts the company's Web site. Andrew wants to enhance the security of the Web site by
implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
A. Symmetric
B. Secret
C. IPSec
D. Asymmetric
Answer: A,D

GIAC examen   GSSP-NET examen   GSSP-NET

NO.14 You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its
application development platform. You create an ASP.NET Web application using the .NET Framework
3.5. The application contains two HTML pages named Error.htm and
PageNotFound.htm. You want to make sure that the following requirements are met:
l When any user requests a page that does not exist, the PageNotFound.htm page is
displayed.
l When any other error occurs, the Error.htm page is displayed. Which of the following code segments will
you add to the Web.config file to accomplish this task?
A. <customErrors mode="On" defaultRedirect="Error.htm">
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
B. <customErrors mode="Off">
<error statusCode="400" redirect="Error.htm"/>
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
C. <customErrors mode="On">
<error statusCode="400" redirect="Error.htm"/>
<error statusCode="404" redirect="PageNotFound.htm"/> </customErrors>
D. <customErrors mode="Off" defaultRedirect="Error.htm"> <error statusCode="404"
redirect="PageNotFound.htm"/> </customErrors>
Answer: A

GIAC examen   GSSP-NET   GSSP-NET examen   GSSP-NET examen

NO.15 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its
application development platform. You are creating an ASP.NET Web application using .NET Framework
3.5. The application will be used to share any type of photos on Internet. All the photos should be
accessible in various sizes and formats. You need to add a download feature that can be easily
maintained. You also need to make sure that only a single version of all photos is stored on a SQL server
database. What will you do?
A. Create an HttpModule class to determine the request for the photo download. Process the photo
according to the given format and size, and after that return the processed photo in the response.
B. Create a user control that converts the photo to the required format and size.
C. Create an HttpHandler class to determine the request for the photo download. Process the photo
according to the given format and size, and after that return the processed photo in the response.
D. Create an ActiveX control that converts the photo to the required format and size.
Answer: C

GIAC examen   GSSP-NET   certification GSSP-NET   GSSP-NET

NO.16 You can use LINQ in an ASP.NET application through the LinqDataSource control, the __________
control, or by creating LINQ queries.
A. ADO.NET DataSet
B. ObjectDataSource
C. SqlDataSource
D. XmlDataSource
Answer: B

GIAC examen   GSSP-NET   GSSP-NET examen   GSSP-NET examen   certification GSSP-NET

NO.17 You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its
application development platform. You have recently created an application that includes the code shown
below.
string str1 = "ABC";
string str2 = "u";
str2 += "Certify";
Console.WriteLine(str1 == str2);
Console.WriteLine((Object) str1 == (Object) str2);
Console.WriteLine(str1.Equals(str2));
What will be the output of the above code?
A. False False False
B. False True False
C. True True True
D. True False True
Answer: D

GIAC   GSSP-NET examen   GSSP-NET   certification GSSP-NET   GSSP-NET examen

NO.18 Which of the following techniques is used to transmit passwords during authentication?
A. Asymmetric encryption
B. Hashing
C. Salted Hash
D. Symmetric encryption
Answer: C

GIAC   GSSP-NET   GSSP-NET   GSSP-NET

NO.19 You work as a Software Developer for ABC Inc. The company has several branches worldwide. The
company uses Visual Studio.NET 2005 as its application development platform. You have recently
finished the development of an application using .NET Framework 2.0. The application can be used only
for cryptography. Therefore, you have implemented the application on a computer. What will you call the
computer that implemented cryptography?
A. Cryptographic toolkit
B. Cryptosystem
C. Cryptographer
D. Cryptanalyst
Answer: B

certification GIAC   GSSP-NET   GSSP-NET   GSSP-NET examen   certification GSSP-NET

NO.20 You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that
will handle information related to monthly sales of the company. You wish to secure the Web site so that
only employees of the Accounts department can view the Web pages. You need to create roles for the
employees of this department. The user account information will be stored in a SQL Server database
named Database. You decide to do all this by using the Web Site Administration Tool. Which of the
following types of security will you use to accomplish the task?
A. Forms-based authentication
B. Integrated Microsoft Windows authentication
C. Basic authentication
D. Digest authentication
Answer: A

GIAC   certification GSSP-NET   GSSP-NET examen   GSSP-NET examen

Le test GIAC GSSP-NET est bien populaire dans l'Industrie IT. Donc il y a de plus en plus de gens à participer le test GIAC GSSP-NET. En fait, c'est pas facile à passer le test si on n'a pas une formation particulière. Pass4Test peut vous aider à économiser le temps et les efforts à réussir le test Certification.

2014年1月4日星期六

Le matériel de formation de l'examen de meilleur GIAC GCPM

C'est un bon choix si vous prendre l'outil de formation de Pass4Test. Vous pouvez télécharger tout d'abord le démo gratuit pour prendre un essai. Vous aurez plus confiances sur Pass4Test après l'essai de notre démo. Si malheureusement, vous ne passe pas le test, votre argent sera tout rendu.

Vous pouvez trouver un meilleur boulot dans l'industrie IT à travers d'obtenir le test GIAC GCPM, la voie à la réussite de votre professionnel sera ouverte pour vous.

Code d'Examen: GCPM
Nom d'Examen: GIAC (GIAC Certified Project Manager Certification Practice Test)
Questions et réponses: 397 Q&As

Dans ce monde d'informatique, l'industrie IT est suivi par de plus en plus de ges. Dans ce domaine demandant beaucoup de techniques, il faut des Certificat à se preuver les techniques professionnelle. Les Certificats IT sont improtant pour un interviewé pendant un entretien. C'est pas facile à passer le test GIAC GCPM, donc c'est pourquoi beaucoup de professionnels qui choisissent ce Certificat pour se preuver.

La partie plus nouvelle de test Certification GIAC GCPM est disponible à télécharger gratuitement dans le site de Pass4Test. Les exercices de Pass4Test sont bien proches de test réel GIAC GCPM. En comparaison les Q&As dans les autres sites, vous trouverez que les nôtres sont beaucoup plus complets. Les Q&As de Pass4Test sont tout recherchés par les experts de Pass4Test, y compris le test simulation.

Choisir le Pass4Test peut vous aider à réussir 100% le test GIAC GCPM qui change tout le temps. Pass4Test peut vous offrir les infos plus nouvelles. Dans le site de Pass4Test le servie en ligne est disponible toute la journée. Si vous ne passerez pas le test, votre argent sera tout rendu.

GCPM Démo gratuit à télécharger: http://www.pass4test.fr/GCPM.html

NO.1 Charlie has just completed the project according to the terms of the contract. She and the customer
are completing a walk through of the project deliverables, and the customer is asking for changes to the
deliverables before she'll accept the product. What project management process should manage the
documented change request that may come from scope verification?
A. Scope management
B. Perform integrated change control
C. Control Scope
D. Control change control
Answer: B

GIAC   GCPM examen   GCPM

NO.2 You work as a project manager for Xxxx Inc. Which of the following processes will you use to formalize
the acceptance of the completed project deliverables?
A. Verify scope
B. Report performance
C. Expert judgment
D. Perform quality control
Answer: A

certification GIAC   GCPM   GCPM   certification GCPM   GCPM examen

NO.3 You work as a project manager for Xxxx Inc. You are performing steps to carry out and finish the
project according to the measures drawn through the planning stage. Which of the following stages of the
project are you working on?
A. Monitoring and controlling
B. Closing
C. Initiation
D. Execution
Answer: D

GIAC   GCPM   GCPM examen   certification GCPM

NO.4 Which of the following are the characteristics of the project life cycle?
Each correct answer represents a complete solution. Choose all that apply.
A. Cost and staffing are low at the start, are high as the work is carried out, and decrease as the project
comes towards the end.
B. Stakeholders influences, risk, and uncertainty are at peak in the beginning of the project.
C. Skills to influence the final characteristics of the project's product, without much impact on cost, is at
peak in the beginning of the project and reduces as the project progresses towards completion.
D. It is limited by constraints, including resource constraints.
Answer: A,B,C

GIAC examen   GCPM   GCPM examen

NO.5 You work as a project manager for Xxxx Inc. You have to subdivide project
deliverables and project work into smaller, more manageable components. Which of the following
processes will you use to perform the above task?
A. Create WBS
B. Verify scope
C. Control scope
D. Define activities
Answer: A

GIAC   GCPM   certification GCPM   GCPM   GCPM   GCPM

NO.6 You work as a project manager for Xxxx Inc. You are in the project kickoff meeting. Which of the
following documents are reviewed during the project kickoff meeting?
Each correct answer represents a complete solution. Choose all that apply.
A. Project budget
B. Project WBS
C. Project charter
D. Project scope
Answer: A,C,D

GIAC   GCPM   GCPM   GCPM

NO.7 Which of the following processes formally permits the initiation of a project and marks the kickoff for all
consequent development activities to begin?
A. Develop project charter
B. Develop project management plan
C. Develop project scope statement
D. Develop project team
Answer: A

GIAC   GCPM   GCPM   GCPM examen   certification GCPM

NO.8 You are the project manager of the NHT Project. This project has 12,345 office doors to install
throughout a campus. Each of the doors costs the project $456 and requires special hardware to
electronically lock and open the doors. You've gathered the project team before they begin the installation
for a hands-on training. As a group you and the project team install 50 doors following a checklist of
instructions so that every door will be installed exactly the same throughout the campus and with minimal
waste. This is an example of what project execution technique?
A. Preventive action
B. Implemented corrective action
C. Quality control
D. Defect repair validation
Answer: A

GIAC   GCPM examen   GCPM examen   GCPM

NO.9 Which of the following are the characteristics of a project?
Each correct answer represents a complete solution. Choose all that apply.
A. Its success is measured by evaluating whether it meets or exceeds expectations of the stakeholders.
B. It is temporary in nature and has a definite beginning and ending date.
C. It is completed when the project goals are achieved.
D. It is common in nature.
Answer: A,B,C

GIAC   GCPM examen   GCPM

NO.10 Which of the following processes formally permits the initiation of a project and marks the kickoff for all
consequent development activities to begin?
A. Develop project scope statement
B. Develop project management plan
C. Develop project charter
D. Develop project team
Answer: C

GIAC   certification GCPM   certification GCPM   GCPM   GCPM examen

NO.11 You are the project manager for your organization. Marcy, a project stakeholder, is demanding that you
add some deliverables to your project scope for free. You explain to Marcy that it's too late in the project
execution to consider adding these deliverables, as most of the software your project team is creating is
nearly done. Marcy and you escalate the issue to management.
Management decides that you will add the deliverables to the project scope if Marcy pays a significant fee
and allows you additional time to complete the project. What conflict resolution method has management
offered?
A. Issue management
B. Compromising
C. Forcing
D. Confronting
Answer: B

GIAC   GCPM examen   GCPM   certification GCPM

NO.12 You work as a project manager for Xxxx Inc. You are working on a project that has a budget of
$805,000 and you have completed 45 percent of the project work. Due to some errors, however, you have
actually spent $430,000 of the budget. Management wants to know the project's cost performance index.
Which of the following values will you report?
A. 0.87
B. 0.80
C. 0.84
D. 0.86
Answer: C

GIAC examen   GCPM   GCPM examen   GCPM examen   GCPM examen

NO.13 Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the
project planning processes is now coming into fruition. What individual should respond to the risk with the
preplanned risk response?
A. Diane
B. Risk owner
C. Subject matter expert
D. Project sponsor
Answer: B

GIAC   GCPM   certification GCPM   certification GCPM

NO.14 You are in a project to create a Website. Your project team has met a few times and you're working
with them to develop the project's WBS. Jan, a marketing expert, is in disagreement with Larry over how
the Website should function. Gary and Gina are in disagreement over who'll take the lead on the design of
the software for the Website. Mark, Mary, and Martha are all bickering about the photo management
approach for the Website's pictures. What stage of team development is your project team currently in?
A. Forming
B. Storming
C. Performing
D. Norming
Answer: B

certification GIAC   GCPM examen   GCPM examen

NO.15 Which of the following is described in the statement below.?
"It is a group of sequential and related project phases that are defined by the organization and control
needs of the management or organizations concerned with the project, the nature of the project itself, and
the application area."
A. Verify scope
B. Project charter
C. Activity list
D. Project life cycle
Answer: D

GIAC   GCPM   GCPM examen   GCPM examen

NO.16 Which of the following processes describes the statement below?
"It consists of the processes required to ensure that the project contains all the work required to complete
the project effectively."
A. Project communications management
B. Project scope management
C. Risk management
D. Project human resource management
Answer: B

GIAC examen   certification GCPM   GCPM   GCPM

NO.17 You are using the PDCA model to determine, implement, monitor, control, and maintain Information
Security Management System or ISMS. You have to evaluate the new processes and match up to the
results against the probable results to determine the differences. In which of the following phases of the
PDCA are you working?
A. Do
B. Act
C. Plan
D. Check
Answer: D

GIAC   GCPM   GCPM

NO.18 You work as a project manager for Xxxx Inc. You report the project details directly to the vice president
and the administrator of your organization. In which of the following types of organization structures are
you working?
A. Functional
B. Matrix
C. Jury
D. Projectized
Answer: B

GIAC   GCPM examen   GCPM examen   GCPM   GCPM examen

NO.19 You work as a project manager for Xxxx Inc. A new project has been proposed to change all keyboards
of every computer in your organization. There are 1,600 keyboards that will need to be removed and
replaced with wireless keyboards. What document will you first need to start this project?
A. Project risk statement
B. Risk register
C. Project charter
D. Contract for new keyboards
Answer: C

certification GIAC   GCPM examen   GCPM examen   GCPM   GCPM examen

NO.20 You work as a project manager for Xxxx Inc. Which of the following stages of the process group, if not
performed well by you, is unlikely that the project will be successful in meeting the business needs?
A. Monitoring and controlling
B. Initiation
C. Executing
D. Planning and design
Answer: B

GIAC   GCPM examen   GCPM   certification GCPM   GCPM

NO.21 You work as a project manager for BlueWell Inc. Which of the following techniques will you use to
determine whether particular work can best be accomplished by the project team or must be purchased
from the outside sources?
A. Expert Judgment
B. Make-or-Buy Analysis
C. Contract Types
D. Procurement Negotiations
Answer: B

GIAC   GCPM examen   GCPM

NO.22 You are a new Project Manager that has been entrusted with a software development project that is in
progress. A sub-contracting company has been awarded a cost reimbursable contract to do the
development work on this project, and the project has been completed. While trying to close this
procurement, you discover that still there are some unresolved claims. However, the sub contract
company does not accept that these claims are unresolved. Which of the following is the best method for
reaching the final equitable settlement?
A. Litigation
B. Mediation
C. Direct negotiation
D. Alternative dispute resolution
Answer: C

GIAC   GCPM examen   GCPM   GCPM   GCPM

NO.23 You are the program manager for your project. You are working with the project managers regarding
the procurement processes for their projects. You have ruled out one particular contract type because it is
considered too risky for the program. Which one of the following contract types is usually considered to be
the most dangerous for the buyer?
A. Cost plus incentive fee
B. Time and materials
C. Cost plus percentage of costs
D. Fixed fee
Answer: C

GIAC   certification GCPM   certification GCPM   certification GCPM

NO.24 You work as a project manager for Xxxx Inc. You are working on several projects. Your projects vary in
size and budget. You have to calculate the ratios of schedule and cost compared to plan, so that you can
compare relative schedule and cost performance of each project. Which of the following components of
EVM provide measures of schedule and cost performance that are not affected by the size of the project?
A. BAC and EAC
B. CPI and SPI
C. CV and SV
D. PV and EV
Answer: B

GIAC   GCPM   GCPM   GCPM   GCPM examen

NO.25 James works as the project manager for a software project. He and his team are on the Direct and
Manage Project Execution process. All of the following are inputs of this process except for which one?
A. Project charter
B. Organizational process assets
C. Enterprise environmental factors
D. Approved environmental requests
E. Project management plan
Answer: A

GIAC   GCPM   GCPM

NO.26 Which of the following techniques is described in the statement below?
"It evaluates the abstract early start and finish dates and late start and finish dates for all activities devoid
of any resource limitations by performing a forward and backward pass analysis through the schedule
network."
A. Resource utilization
B. Critical path method
C. Critical Chain method
D. Resource leveling heuristic
Answer: B

certification GIAC   GCPM   GCPM   GCPM   certification GCPM

NO.27 You are a Project Manager in your organization who is managing a considerably huge budget project
to develop new software. Considering the varied nature of your stakeholder group, you would like to put
together a plan as to what information the stakeholders need, and how to provide that information. What
is the document that you would need, and as part of which process group would you achieve this?
A. Communications Management Plan, Execution Process group
B. Project Management Plan, Planning Process Group
C. Communications Management Plan, Planning Process Group
D. Project Management Plan, Initiating Process Group
Answer: C

certification GIAC   GCPM examen   certification GCPM   GCPM

NO.28 You work as a project manager for Xxxx Inc. You are performing a task to generate a hierarchical list of
resources related by function and resource type that is used to facilitate planning and controlling of project
work. Which of the following components of project management will you use to accomplish the above
task?
A. PERT chart
B. RBS
C. Gantt chart
D. WBS
Answer: B

GIAC examen   certification GCPM   GCPM   GCPM   GCPM   GCPM examen

NO.29 Which of the following is described in the statement below?
"It is a tool that defines a project and groups the project's discrete work elements in a way that helps
organize and define the total work scope of the project."
A. WBS
B. RBS
C. Gantt chart
D. Critical path
Answer: A

GIAC   GCPM   GCPM   certification GCPM   GCPM   GCPM

NO.30 Which of the following components of EVA is described in the statement below?
"It is a measure of how much of the project value has been earned so far through completed work, that is,
the budgeted cost of the work that has been performed through the project status date."
A. PV
B. AC
C. SV
D. EV
Answer: D

GIAC   certification GCPM   GCPM   GCPM examen   GCPM   GCPM

L'équipe de Pass4Test rehcerche la Q&A de test certification GIAC GCPM en visant le test GIAC GCPM. Cet outil de formation peut vous aider à se préparer bien dans une courte terme. Vous vous renforcerez les connaissances de base et même prendrez tous essences de test Certification. Pass4Test vous assure à réussir le test GIAC GCPM sans aucune doute.

2013年11月16日星期六

Dernières GIAC GCFA de la pratique de l'examen questions et réponses téléchargement gratuit

L'importance de la position de Certificat GIAC GCFA dans l'industrie IT est bien claire pour tout le monde, mais c'est pas facile à obtenir ce Certificat. Il y a beaucoup de Q&As qui manquent une haute précision des réponses. Cependant, Pass4Test peut offrir des matériaux pratiques pour toutes les personnes à participer l'examen de Certification, et il peut aussi offrir à tout moment toutes les informations que vous auriez besoin à réussir l'examen GIAC GCFA par votre première fois.

Le guide d'étude de Pas4Test comprend l'outil de se former et même que le test de simulation très proche de test réel. Pass4Test vous permet de se forcer les connaissances professionnelles ciblées à l'examen Certification GIAC GCFA. Il n'y a pas de soucis à réussir le test avec une haute note.

Vous pouvez trouver un meilleur boulot dans l'industrie IT à travers d'obtenir le test GIAC GCFA, la voie à la réussite de votre professionnel sera ouverte pour vous.

Code d'Examen: GCFA
Nom d'Examen: GIAC (GIAC Certified Forensics Analyst)
Questions et réponses: 316 Q&As

Vous pouvez télécharger le démo gratuit pour prendre un essai. Vous aurez plus confiance sur Pass4Test. N'hésitez plus à choisir la Q&A GIAC GCFA comme votre guide d'étude.

Pass4Test est un fournisseur de formation pour une courte terme, et Pass4Test peut vous assurer le succès de test GIAC GCFA. Si malheureusement, vous échouez le test, votre argent sera tout rendu. Vous pouvez télécharger le démo gratuit avant de choisir Pass4Test. Au moment là, vous serez confiant sur Pass4Test.

Si vous voulez ne se soucier plus à passer le test GIAC GCFA, donc vous devez prendre la Q&A de Pass4Test comme le guide d'étude pendant la préparation de test GIAC GCFA. C'est une bonne affaire parce que un petit invertissement peut vous rendre beaucoup. Utiliser la Q&A GIAC GCFA offerte par Pass4Test peut vous assurer à réussir le test 100%. Pass4Test a toujours une bonne réputation dans l'Industrie IT.

GCFA Démo gratuit à télécharger: http://www.pass4test.fr/GCFA.html

NO.1 Which of the following modules of OS X kernel (XNU) provides the primary system program interface?
A. BSD
B. LIBKERN
C. I/O Toolkit
D. Mach
Answer: A

GIAC   GCFA examen   GCFA   GCFA

NO.2 Which of the following methods is used by forensic investigators to acquire an image over the network
in a secure manner?
A. DOS boot disk
B. Linux Live CD
C. Secure Authentication for EnCase (SAFE)
D. EnCase with a hardware write blocker
Answer: C

GIAC   GCFA examen   GCFA   GCFA

NO.3 You want to upgrade a partition in your computer's hard disk drive from FAT to NTFS. Which of the
following DOS commands will you use to accomplish this?
A. FORMAT C: /s
B. CONVERT C: /fs:ntfs
C. SYS C:
D. FDISK /mbr
Answer: B

certification GIAC   GCFA   GCFA

NO.4 Which of the following type of file systems is not supported by Linux kernel?
A. vFAT
B. NTFS
C. HFS
D. FAT32
Answer: D

GIAC   certification GCFA   GCFA examen   GCFA examen

NO.5 Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of
Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and
database files from the computer. After performing these malicious tasks, Adam finally runs the following
command on the Linux command box before disconnecting. for (( i =
0;i<11;i++ )); do
dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done
Which of the following actions does Adam want to perform by the above command?
A. Making a bit stream copy of the entire hard disk for later download.
B. Deleting all log files present on the system.
C. Wiping the contents of the hard disk with zeros.
D. Infecting the hard disk with polymorphic virus strings.
Answer: C

certification GIAC   certification GCFA   GCFA examen

NO.6 Which of the following is the first computer virus that was used to infect the boot sector of storage
media formatted with the DOS File Allocation Table (FAT) file system?
A. Melissa
B. Tequila
C. Brain
D. I love you
Answer: C

GIAC   GCFA   GCFA examen   GCFA

NO.7 John works as a professional Ethical Hacker. He has been assigned the project of testing the security of
www.we-are-secure.com. He receives the following e-mail:
The e-mail that John has received is an example of __________.
A. Virus hoaxes
B. Spambots
C. Social engineering attacks
D. Chain letters
Answer: D

GIAC examen   GCFA examen   GCFA   GCFA

NO.8 Which of the following tools can be used to perform tasks such as Windows password cracking,
Windows enumeration, and VoIP session sniffing?
A. John the Ripper
B. L0phtcrack
C. Obiwan
D. Cain
Answer: D

certification GIAC   GCFA examen   GCFA examen   GCFA   certification GCFA   certification GCFA

NO.9 An executive in your company reports odd behavior on her PDA. After investigation you discover that a
trusted device is actually copying data off the PDA. The executive tells you that the behavior started
shortly after accepting an e-business card from an unknown person. What type of attack is this?
A. Session Hijacking
B. Bluesnarfing
C. PDA Hijacking
D. Privilege Escalation
Answer: B

GIAC   certification GCFA   GCFA   GCFA examen

NO.10 Which of the following file systems provides file-level security?
A. CDFS
B. FAT
C. FAT32
D. NTFS
Answer: D

GIAC   GCFA examen   GCFA examen   GCFA   GCFA

NO.11 You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to
investigate e-mail information of an employee of the company. The suspected employee is using an
online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will
you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. History folder
B. Temporary Internet Folder
C. Download folder
D. Cookies folder
Answer: A,B,D

GIAC examen   GCFA   GCFA examen

NO.12 Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the
server of the marketing department has been affected by a malicious hacking attack. Supervisors are also
claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the
marketing department and identified the event as an incident. He isolated the infected network from the
remaining part of the network and started preparing to image the entire system. He captures volatile data,
such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
A. Recovery
B. Eradication
C. Identification
D. Containment
Answer: D

certification GIAC   certification GCFA   GCFA examen

NO.13 Which of the following is the process of overwriting all addressable locations on a disk?
A. Drive wiping
B. Spoofing
C. Sanitization
D. Authentication
Answer: A

GIAC examen   certification GCFA   GCFA   GCFA examen   certification GCFA

NO.14 Fill in the blank with the appropriate name.
_____is a list, which specifies the order of volatility of data in a Windows based system.
A. RFC 3227
Answer: A

GIAC examen   certification GCFA   GCFA examen   GCFA examen

NO.15 Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States.
A project has been assigned to him to investigate a case of a disloyal employee who is suspected of
stealing design of the garments, which belongs to the company and selling those garments of the same
design under different brand name. Adam investigated that the company does not have any policy related
to the copy of design of the garments. He also investigated that the trademark under which the employee
is selling the garments is almost identical to the original trademark of the company. On the grounds of
which of the following laws can the employee be prosecuted.?
A. Trademark law
B. Cyber law
C. Copyright law
D. Espionage law
Answer: A

GIAC   certification GCFA   GCFA examen   certification GCFA   GCFA

NO.16 You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP
Professional on your computer, which already has Windows Me installed. You want to configure your
computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB
hard disk.
Which of the following file systems will you choose to dual-boot between the two operating
systems?
A. NTFS
B. FAT32
C. CDFS
D. FAT
Answer: B

GIAC   GCFA   certification GCFA   GCFA examen   GCFA

NO.17 Which of the following is the correct order of loading system files into the main memory of the system,
when the computer is running on Microsoft's Windows XP operating system?
A. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
B. NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe
C. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
D. BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe
Answer: B

GIAC   GCFA   certification GCFA

NO.18 TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the
target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker
and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port
will drop the packet. Which of the following operating systems can be easily identified with the help of TCP
FIN scanning?
A. Solaris
B. Red Hat
C. Knoppix
D. Windows
Answer: D

GIAC   GCFA   certification GCFA   certification GCFA

NO.19 A firewall is a combination of hardware and software, used to provide security to a network. It is used
to protect an internal network or intranet against unauthorized access from the Internet or other outside
networks. It restricts inbound and outbound access and can analyze all traffic between an internal
network and the Internet. Users can configure a firewall to pass or block packets from specific IP
addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
A. OpenSSH
B. IPTables
C. IPChains
D. Stunnel
Answer: B

certification GIAC   GCFA examen   GCFA examen   GCFA   GCFA

NO.20 Which of the following encryption methods uses AES technology?
A. Dynamic WEP
B. Static WEP
C. TKIP
D. CCMP
Answer: D

GIAC   GCFA examen   GCFA

NO.21 Adam works as a Security Administrator for Umbrella Inc. He is responsible for securing all 15 servers
of the company. To successfully accomplish the task, he enables the hardware and software firewalls and
disables all unnecessary services on all the servers. Sales manager of the company asks Adam to run
emulation software on one of the servers that requires the telnet service to function properly. Adam is
concerned about the security of the server, as telnet can be a very large security risk in an organization.
Adam decides to perform some footprinting, scanning, and penetration testing on the server to checkon
the server to check the security. Adam telnets into the server and writes the following command:
HEAD / HTTP/1.0
After pressing enter twice, Adam gets the following results:
Which of the following tasks has Adam just accomplished?
A. Poisoned the local DNS cache of the server.
B. Submitted a remote command to crash the server.
C. Grabbed the banner.
D. Downloaded a file to his local computer.
Answer: C

GIAC   certification GCFA   GCFA

NO.22 Which of the following Acts enacted in United States allows the FBI to issue National Security Letters
(NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
A. Wiretap Act
B. Computer Fraud and Abuse Act
C. Economic Espionage Act of 1996
D. Electronic Communications Privacy Act of 1986
Answer: D

GIAC examen   GCFA examen   GCFA examen   GCFA

NO.23 You company suspects an employee of sending unauthorized emails to competitors. These emails are
alleged to contain confidential company data. Which of the following is the most important step for you to
take in preserving the chain of custody?
A. Preserve the email server including all logs.
B. Make copies of that employee's email.
C. Seize the employee's PC.
D. Place spyware on the employee's PC to confirm these activities.
Answer: A

GIAC   certification GCFA   GCFA examen   GCFA examen

NO.24 Mark works as a security manager for SofTech Inc. He is using a technique for monitoring what the
employees are doing with corporate resources. Which of the following techniques is being used by Mark
to gather evidence of an ongoing computer crime if a member of the staff is e-mailing company's secrets
to an opponent?
A. Electronic surveillance
B. Civil investigation
C. Physical surveillance
D. Criminal investigation
Answer: A

certification GIAC   GCFA examen   GCFA   certification GCFA   certification GCFA

NO.25 You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on
your company's Web site. Which of the following methods of investigation can you use to accomplish the
task?
Each correct answer represents a complete solution. Choose all that apply.
A. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL
to the company's site.
B. Look at the Web server's logs and normal traffic logging.
C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the
input page, which may give log of the malicious traffic and the IP address of the source.
D. Use a Web proxy to view the Web server transactions in real time and investigate any
communication with outside servers.
Answer: A,B,D

GIAC examen   GCFA   GCFA   GCFA   certification GCFA

NO.26 The MBR of a hard disk is a collection of boot records that contain disk information such as disk
architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating
system files that are required to run a hard disk. In the context of the operating system,
MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?
Each correct answer represents a complete solution. Choose two.
A. Stealth
B. Boot sector
C. Multipartite
D. File
Answer: B,C

GIAC   GCFA   GCFA   certification GCFA   certification GCFA

NO.27 Which of the following attacks saturates network resources and disrupts services to a specific
computer?
A. Teardrop attack
B. Polymorphic shell code attack
C. Denial-of-Service (DoS) attack
D. Replay attack
Answer: C

GIAC   certification GCFA   certification GCFA

NO.28 You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest single
domain network. The network is configured on IP version 6 protocol. All the computers on the network are
connected to a switch device. One day, users complain that they are unable to connect to a file server.
You try to ping the client computers from the server, but the pinging fails. You try to ping the server's own
loopback address, but it fails to ping. You restart the server, but the problem persists.
What is the most likely cause?
A. The cable that connects the server to the switch is broken.
B. Automatic IP addressing is not working.
C. The switch device is not working.
D. The server is configured with unspecified IP address.
E. The server's NIC is not working.
Answer: E

certification GIAC   GCFA   GCFA examen   GCFA   certification GCFA

NO.29 You work as a Network Administrator for Perfect Solutions Inc. You install Windows 98 on a computer.
By default, which of the following folders does Windows 98 setup use to keep the registry tools?
A. $SYSTEMROOT$REGISTRY
B. $SYSTEMROOT$WINDOWS
C. $SYSTEMROOT$WINDOWSREGISTRY
D. $SYSTEMROOT$WINDOWSSYSTEM32
Answer: B

certification GIAC   GCFA examen   GCFA   GCFA   certification GCFA

NO.30 Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer
runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He
knows that in Windows operating system, the data is searched in pre-defined steps for proper and
efficient analysis. Which of the following is the correct order for searching data on a Windows based
system?
A. Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces
B. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
C. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
D. Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces
Answer: D

GIAC examen   certification GCFA   GCFA

Le test GIAC GCFA est populaire dans l'Industrie IT. Il y a beaucoup de professionnels IT veulent ce passport de IT. Votre vie et salaire sera améliorée avec ce Certificat. Vous aurez une meilleure assurance.

Le matériel de formation de l'examen de meilleur GIAC GSEC

La Q&A de Pass4Test vise au test Certificat GIAC GSEC. L'outil de formation GIAC GSEC offert par Pass4Test comprend les exercices de pratique et le test simulation. Vous pouvez trouver les autres sites de provider la Q&A, en fait vous allez découvrir que c'est l'outil de formation de Pass4Test qui offre les documentaions plus compètes et avec une meilleure qualité.

Vous pouvez trouver un meilleur boulot dans l'industrie IT à travers d'obtenir le test GIAC GSEC, la voie à la réussite de votre professionnel sera ouverte pour vous.

L'importance de la position de Certificat GIAC GSEC dans l'industrie IT est bien claire pour tout le monde, mais c'est pas facile à obtenir ce Certificat. Il y a beaucoup de Q&As qui manquent une haute précision des réponses. Cependant, Pass4Test peut offrir des matériaux pratiques pour toutes les personnes à participer l'examen de Certification, et il peut aussi offrir à tout moment toutes les informations que vous auriez besoin à réussir l'examen GIAC GSEC par votre première fois.

Les spécialistes d'expérience de Pass4Test ont fait une formation ciblée au test GIAC GSEC. Cet outil de formation est convenable pour les candidats de test GIAC GSEC. Pass4Test n'offre que les produits de qualité. Vous aurez une meilleure préparation à passer le test avec l'aide de Pass4Test.

Est-que vous s'inquiétez encore à passer le test Certification GSEC qui demande beaucoup d'efforts? Est-que vous travaillez nuit et jour juste pour préparer le test de GIAC GSEC? Si vous voulez réussir le test GIAC GSEC plus facilement? N'hésitez plus à nous choisir. Pass4Test vous aidera à réaliser votre rêve.

Code d'Examen: GSEC
Nom d'Examen: GIAC (GIAC Security Essentials Certification)
Questions et réponses: 280 Q&As

GSEC Démo gratuit à télécharger: http://www.pass4test.fr/GSEC.html

NO.1 Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-
based network. The company has two offices in different cities. The offices are connected through the
Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is
required to create a secure connection between both offices. He configures a VPN connection between
the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of
the following will he achieve with this configuration?
Each correct answer represents a part of the solution. Choose two.
A. Encryption for the local files stored on the two servers
B. Highest possible encryption for traffic between the offices
C. Mutual authentication between the two servers
D. Extra bandwidth on the Internet connection
Answer: B, C

GIAC   GSEC examen   certification GSEC

NO.2 The /cat/etc/passwd file on a client computer contains the following entry: Martha:x:::::bin/false
Which of the following is true for Martha?
A. Martha's password is x.
B. Martha has full access on the computer.
C. Martha has limited access on the computer.
D. Martha has been denied access on the computer.
Answer: D

GIAC   GSEC   GSEC

NO.3 Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct
answer represents a complete solution. Choose all that apply.
A. SSL provides message integrity to prevent alteration to the message.
B. During SSL session, information is encrypted to prevent unauthorized disclosure.
C. SSL can process credit cards.
D. SSL can support 128-bit encryption.
Answer: A,B,D

GIAC   GSEC examen   GSEC   GSEC

NO.4 Rick works as a Network Administrator. He is configuring the systems for maximum security. Before
using the security template, he wants to edit it to change some of the security settings that are not
required for now. Which of the following tools will he choose, to edit the security template?
A. Group Policy MMC snap-in
B. Security Configuration and Analysis MMC snap-in
C. Security Templates MMC snap-in
D. SECEDIT utility
Answer: C

GIAC   GSEC   certification GSEC

NO.5 Which of the following statements are true about satellite broadband Internet access? Each correct
answer represents a complete solution. Choose two.
A. It is among the least expensive way of gaining broadband Internet access.
B. It is among the most expensive way of gaining broadband Internet access.
C. This type of internet access has low latency compared to other broadband services.
D. This type of internet access has high latency compared to other broadband services.
Answer: B, D

certification GIAC   GSEC   GSEC   GSEC   certification GSEC   GSEC

NO.6 Which of the following is used to implement a procedure to control inbound and outbound traffic on a
network?
A. Cookies
B. Sam Spade
C. NIDS
D. ACL
Answer: D

GIAC   GSEC   certification GSEC   GSEC examen

NO.7 You want to temporarily change your primary group to another group of which you are a member. In
this process, a new shell will be created, and when you exit the shell, your previous group will be
reinstated. Which of the following commands will you use to accomplish this task?
A. newgrp
B. chgrp
C. chown
D. chmod
Answer: A

certification GIAC   certification GSEC   certification GSEC

NO.8 Which of the following protocols multicasts messages and information among all member devices in
an IP multicast group?
A. IGMP
B. TCP
C. ARP
D. ICMP
Answer: A

GIAC   GSEC   certification GSEC   certification GSEC   GSEC   GSEC

NO.9 Which of the following is not an encryption technology?
A. Blowfish
B. KILL
C. 3DES
D. MD5
Answer: B

GIAC   GSEC examen   GSEC

NO.10 Which of the following terms describes software technologies that improve portability, manageability
and compatibility of applications by encapsulating them from the underlying operating system on which
they are executed?
A. Application virtualization
B. Encapsulation
C. System hardening
D. Failover
Answer: A

GIAC   certification GSEC   GSEC   certification GSEC   GSEC examen

NO.11 You have a customer who wants to put wireless internet in his remote cabin. The cabin is many miles
from any other building with internet connectivity or access points. What should you recommend?
A. DSL
B. FIOS connection
C. Satellite internet
D. Microwave connection
Answer: C

GIAC   certification GSEC   GSEC

NO.12 Which of the following terms is synonymous with the willful destruction of another person's property?
A. Spoofing
B. Hacking
C. Phishing
D. Vandalism
Answer: D

GIAC examen   GSEC   GSEC   GSEC examen   GSEC

NO.13 You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network. You
have created a script named lf.cgi. You want to provide the following permissions on it:
rwsr-sr-- Which of the following commands will you execute?
A. chmod 2754
B. chmod 6754
C. chmod 7754
D. chmod 4754
Answer: B

GIAC   GSEC   GSEC   certification GSEC   GSEC

NO.14 What is the maximum cable segment length supported by a 10BaseT network?
A. 100 meters
B. 300 meters
C. 250 meters
D. 500 meters
E. 150 meters
Answer: A

GIAC   GSEC   GSEC examen   GSEC examen   GSEC

NO.15 Which of the following directories contains the log files in Linux?
A. /log
B. /root
C. /var/log
D. /etc
Answer: C

GIAC   GSEC   certification GSEC

NO.16 Which of the following terms refers to manual assignment of IP addresses to computers and devices?
A. Static IP addressing
B. Spoofing
C. APIPA
D. Dynamic IP addressing
Answer: A

GIAC examen   GSEC   certification GSEC   GSEC   GSEC examen

NO.17 Which of the following ports is the default port for IMAP4 protocol?
A. TCP port 443
B. TCP port 143
C. TCP port 25
D. TCP port 80
Answer: B

GIAC   GSEC   GSEC   GSEC

NO.18 You work as a Network Administrator for Perfect World Inc. You are configuring a network that will
include 1000BaseT network interface cards in servers and client computers. What is the maximum
segment length that a 1000BaseT network supports?
A. 100 meters
B. 480 meters
C. 1000 meters
D. 10 meters
Answer: A

GIAC   GSEC   GSEC   GSEC examen

NO.19 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He executes the following
command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?
A. root, 500
B. root, 0
C. John, 502
D. John, 0
Answer: B

GIAC   GSEC examen   certification GSEC   GSEC   GSEC examen

NO.20 Which of the following statements about the availability concept of Information security management is
true?
A. It ensures reliable and timely access to resources.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
D. It ensures that modifications are not made to data by unauthorized personnel or processes.
Answer: A

GIAC examen   GSEC examen   GSEC examen   certification GSEC   certification GSEC

NO.21 Which of the following enables an inventor to legally enforce his right to exclude others from using his
invention?
A. Patent
B. Artistic license
C. Phishing
D. Spam
Answer: A

GIAC   GSEC   GSEC   certification GSEC

NO.22 Which of the following frequencies are used by wireless standard 802.11n to operate? Each correct
answer represents a complete solution. Choose two.
A. 1 Ghz
B. 2 Ghz
C. 2.4 Ghz
D. 5 Ghz
Answer: C, D

GIAC   GSEC   GSEC

NO.23 Which of the following is a security threat if included in the search path of a computer?
A. /usr
B. /sbin
C. .
D. /usr/bin
Answer: C

GIAC examen   certification GSEC   GSEC

NO.24 Which of the following is NOT the feature of SELinux in the Red Hat enterprise Linux?
A. SELinux does not provide Kernel-level security.
B. All process and files have a context.
C. SELinux implements Mandatory Access Control (MAC) security in Red Hat Enterprise Linux.
D. SELinux applies to all users, including root.
Answer: A

GIAC   GSEC   GSEC   GSEC

NO.25 Which of the following statements about service pack are true? Each correct answer represents a
complete solution. Choose two.
A. It is a collection of Fixes and Patches in a single product.
B. It is a medium by which product updates are distributed.
C. It is a term generally related to security problems in a software.
D. It is a term used for securing an operating system.
Answer: A,B

GIAC   GSEC   certification GSEC   GSEC   GSEC

NO.26 You work as a Linux Technician for Tech Perfect Inc. You want to protect your server from intruders
who exploit services that are started with TCP Wrappers. Which of the following files will help you protect
the server?
Each correct answer represents a part of the solution. Choose two.
A. httpd.conf
B. lilo.conf
C. hosts.deny
D. hosts.allow
Answer: C, D

certification GIAC   GSEC   GSEC   GSEC examen

NO.27 Which of the following devices connects two segments of the same local area network (LAN) but keeps
traffic separate on the two segments?
A. Hub
B. Modem
C. Bridge
D. Switch
Answer: C

GIAC examen   GSEC   certification GSEC

NO.28 You have been hired by the company to upgrade its existing Windows NT 4.0 network to a Windows
2000 based network. In the past, the company's support group has faced difficult time because users
changed the configuration of their workstations. Which of the following features of the Active Directory
would best justify the move to the Windows 2000 network.?
A. Dynamic domain name system (DDNS)
B. Organizational unit (OU)
C. Dynamic host configuration protocol (DHCP)
D. Group policy object (GPO)
Answer: D

certification GIAC   GSEC examen   GSEC examen   GSEC

NO.29 Which of the following records is the first entry in a DNS database file?
A. SOA
B. SRV
C. CNAME
D. MX
Answer: A

GIAC   GSEC   GSEC   GSEC   GSEC   GSEC

NO.30 You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.
You have configured a VPN server for remote users to connect to the company's network. Which of the
following encryption types will Linux use?
A. MSCHAP
B. RC2
C. 3DES
D. CHAP
Answer: C

GIAC   GSEC examen   GSEC examen   GSEC examen

Dans cette Industrie IT intense, le succès de test GIAC GSEC peut augmenter le salaire. Les gens d'obtenir le Certificat GIAC GSEC peuvent gagner beaucoup plus que les gens sans Certificat GIAC GSEC. Le problème est comment on peut réussir le test plus facile?

GCPM dernières questions d'examen certification GIAC et réponses publiés

Pass4Test est un site de provider les chances à se former avant le test Certification IT. Il y a de différentes formations ciblées aux tous candidats. C'est plus facile à passer le test avec la formation de Pass4Test. Parmi les qui ont déjà réussi le test, la majorité a fait la préparation avec la Q&A de Pass4Test. Donc c'est pourquoi, Pass4Test a une bonne réputation dansn l'Industrie IT.

Selon les feedbacks les professionnels bien réputés dans l'Industrie IT, Pass4Test est un bon catalyseur de leurs succès. L'outil de formation offert par Pass4Test leur aide d'économiser le temps et l'argent, le plus important est qu'ils aient passé le test GIAC GCPM avec succès. Pass4Test est un fournissur fiable. Vous allez réaliser votre rêve avec l'aide de Pass4Test.

On peut voir que beaucoup de candidats ratent le test GIAC GCPM quand même avec l'effort et beaucoup de temps dépensés. Cest une bonne preuve que le test GIAC GCPM est difficile à réussir. Pass4Test offre le guide d'étude bien fiable. Sauf le test GIAC GCPM, Pass4Test peut offrir les Q&As des autres test Certification IT.

Pass4Test vous promet de vous aider à passer le test GIAC GCPM, vous pouvez télécharger maintenant les Q&As partielles de test GIAC GCPM en ligne. Il y a encore la mise à jour gratuite pendant un an pour vous. Si vous malheureusement rater le test, votre argent sera 100% rendu.

Code d'Examen: GCPM
Nom d'Examen: GIAC (GIAC Certified Project Manager Certification Practice Test)
Questions et réponses: 397 Q&As

GCPM Démo gratuit à télécharger: http://www.pass4test.fr/GCPM.html

NO.1 Charlie has just completed the project according to the terms of the contract. She and the customer
are completing a walk through of the project deliverables, and the customer is asking for changes to the
deliverables before she'll accept the product. What project management process should manage the
documented change request that may come from scope verification?
A. Scope management
B. Perform integrated change control
C. Control Scope
D. Control change control
Answer: B

GIAC examen   certification GCPM   certification GCPM   certification GCPM

NO.2 James works as the project manager for a software project. He and his team are on the Direct and
Manage Project Execution process. All of the following are inputs of this process except for which one?
A. Project charter
B. Organizational process assets
C. Enterprise environmental factors
D. Approved environmental requests
E. Project management plan
Answer: A

certification GIAC   GCPM   GCPM examen   certification GCPM   GCPM   GCPM

NO.3 You are the project manager of the NHT Project. This project has 12,345 office doors to install
throughout a campus. Each of the doors costs the project $456 and requires special hardware to
electronically lock and open the doors. You've gathered the project team before they begin the installation
for a hands-on training. As a group you and the project team install 50 doors following a checklist of
instructions so that every door will be installed exactly the same throughout the campus and with minimal
waste. This is an example of what project execution technique?
A. Preventive action
B. Implemented corrective action
C. Quality control
D. Defect repair validation
Answer: A

GIAC examen   GCPM   GCPM   GCPM examen   GCPM examen   GCPM

NO.4 You work as a project manager for Xxxx Inc. You are performing steps to carry out and finish the
project according to the measures drawn through the planning stage. Which of the following stages of the
project are you working on?
A. Monitoring and controlling
B. Closing
C. Initiation
D. Execution
Answer: D

GIAC   certification GCPM   GCPM examen

NO.5 You work as a project manager for Xxxx Inc. A new project has been proposed to change all keyboards
of every computer in your organization. There are 1,600 keyboards that will need to be removed and
replaced with wireless keyboards. What document will you first need to start this project?
A. Project risk statement
B. Risk register
C. Project charter
D. Contract for new keyboards
Answer: C

certification GIAC   GCPM   certification GCPM   GCPM

NO.6 You work as a project manager for BlueWell Inc. Which of the following techniques will you use to
determine whether particular work can best be accomplished by the project team or must be purchased
from the outside sources?
A. Expert Judgment
B. Make-or-Buy Analysis
C. Contract Types
D. Procurement Negotiations
Answer: B

GIAC   GCPM   GCPM examen   certification GCPM   certification GCPM

NO.7 Which of the following is described in the statement below?
"It is a tool that defines a project and groups the project's discrete work elements in a way that helps
organize and define the total work scope of the project."
A. WBS
B. RBS
C. Gantt chart
D. Critical path
Answer: A

GIAC examen   GCPM   GCPM   GCPM

NO.8 You are a new Project Manager that has been entrusted with a software development project that is in
progress. A sub-contracting company has been awarded a cost reimbursable contract to do the
development work on this project, and the project has been completed. While trying to close this
procurement, you discover that still there are some unresolved claims. However, the sub contract
company does not accept that these claims are unresolved. Which of the following is the best method for
reaching the final equitable settlement?
A. Litigation
B. Mediation
C. Direct negotiation
D. Alternative dispute resolution
Answer: C

certification GIAC   GCPM examen   certification GCPM   GCPM

NO.9 You work as a project manager for Xxxx Inc. You report the project details directly to the vice president
and the administrator of your organization. In which of the following types of organization structures are
you working?
A. Functional
B. Matrix
C. Jury
D. Projectized
Answer: B

GIAC examen   GCPM   GCPM examen   certification GCPM

NO.10 Which of the following techniques is described in the statement below?
"It evaluates the abstract early start and finish dates and late start and finish dates for all activities devoid
of any resource limitations by performing a forward and backward pass analysis through the schedule
network."
A. Resource utilization
B. Critical path method
C. Critical Chain method
D. Resource leveling heuristic
Answer: B

GIAC   GCPM   certification GCPM

NO.11 Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the
project planning processes is now coming into fruition. What individual should respond to the risk with the
preplanned risk response?
A. Diane
B. Risk owner
C. Subject matter expert
D. Project sponsor
Answer: B

certification GIAC   GCPM   certification GCPM   certification GCPM

NO.12 Which of the following processes formally permits the initiation of a project and marks the kickoff for all
consequent development activities to begin?
A. Develop project charter
B. Develop project management plan
C. Develop project scope statement
D. Develop project team
Answer: A

certification GIAC   GCPM   GCPM examen   certification GCPM

NO.13 Which of the following components of EVA is described in the statement below?
"It is a measure of how much of the project value has been earned so far through completed work, that is,
the budgeted cost of the work that has been performed through the project status date."
A. PV
B. AC
C. SV
D. EV
Answer: D

GIAC   GCPM examen   GCPM   certification GCPM   GCPM

NO.14 You work as a project manager for Xxxx Inc. You are in the project kickoff meeting. Which of the
following documents are reviewed during the project kickoff meeting?
Each correct answer represents a complete solution. Choose all that apply.
A. Project budget
B. Project WBS
C. Project charter
D. Project scope
Answer: A,C,D

GIAC   GCPM examen   GCPM   GCPM

NO.15 You are a Project Manager in your organization who is managing a considerably huge budget project
to develop new software. Considering the varied nature of your stakeholder group, you would like to put
together a plan as to what information the stakeholders need, and how to provide that information. What
is the document that you would need, and as part of which process group would you achieve this?
A. Communications Management Plan, Execution Process group
B. Project Management Plan, Planning Process Group
C. Communications Management Plan, Planning Process Group
D. Project Management Plan, Initiating Process Group
Answer: C

GIAC   GCPM   GCPM

NO.16 You work as a project manager for Xxxx Inc. You are working on a project that has a budget of
$805,000 and you have completed 45 percent of the project work. Due to some errors, however, you have
actually spent $430,000 of the budget. Management wants to know the project's cost performance index.
Which of the following values will you report?
A. 0.87
B. 0.80
C. 0.84
D. 0.86
Answer: C

GIAC examen   GCPM   GCPM   certification GCPM

NO.17 You are the project manager for your organization. Marcy, a project stakeholder, is demanding that you
add some deliverables to your project scope for free. You explain to Marcy that it's too late in the project
execution to consider adding these deliverables, as most of the software your project team is creating is
nearly done. Marcy and you escalate the issue to management.
Management decides that you will add the deliverables to the project scope if Marcy pays a significant fee
and allows you additional time to complete the project. What conflict resolution method has management
offered?
A. Issue management
B. Compromising
C. Forcing
D. Confronting
Answer: B

GIAC   GCPM examen   GCPM examen   GCPM

NO.18 Which of the following are the characteristics of the project life cycle?
Each correct answer represents a complete solution. Choose all that apply.
A. Cost and staffing are low at the start, are high as the work is carried out, and decrease as the project
comes towards the end.
B. Stakeholders influences, risk, and uncertainty are at peak in the beginning of the project.
C. Skills to influence the final characteristics of the project's product, without much impact on cost, is at
peak in the beginning of the project and reduces as the project progresses towards completion.
D. It is limited by constraints, including resource constraints.
Answer: A,B,C

GIAC examen   GCPM examen   certification GCPM

NO.19 You are in a project to create a Website. Your project team has met a few times and you're working
with them to develop the project's WBS. Jan, a marketing expert, is in disagreement with Larry over how
the Website should function. Gary and Gina are in disagreement over who'll take the lead on the design of
the software for the Website. Mark, Mary, and Martha are all bickering about the photo management
approach for the Website's pictures. What stage of team development is your project team currently in?
A. Forming
B. Storming
C. Performing
D. Norming
Answer: B

certification GIAC   certification GCPM   GCPM

NO.20 Which of the following are the characteristics of a project?
Each correct answer represents a complete solution. Choose all that apply.
A. Its success is measured by evaluating whether it meets or exceeds expectations of the stakeholders.
B. It is temporary in nature and has a definite beginning and ending date.
C. It is completed when the project goals are achieved.
D. It is common in nature.
Answer: A,B,C

GIAC examen   GCPM   GCPM examen   GCPM   GCPM examen

NO.21 You work as a project manager for Xxxx Inc. You have to subdivide project
deliverables and project work into smaller, more manageable components. Which of the following
processes will you use to perform the above task?
A. Create WBS
B. Verify scope
C. Control scope
D. Define activities
Answer: A

GIAC examen   GCPM   certification GCPM

NO.22 You work as a project manager for Xxxx Inc. Which of the following stages of the process group, if not
performed well by you, is unlikely that the project will be successful in meeting the business needs?
A. Monitoring and controlling
B. Initiation
C. Executing
D. Planning and design
Answer: B

GIAC   GCPM   GCPM examen

NO.23 You work as a project manager for Xxxx Inc. You are performing a task to generate a hierarchical list of
resources related by function and resource type that is used to facilitate planning and controlling of project
work. Which of the following components of project management will you use to accomplish the above
task?
A. PERT chart
B. RBS
C. Gantt chart
D. WBS
Answer: B

certification GIAC   GCPM examen   GCPM   GCPM examen

NO.24 You work as a project manager for Xxxx Inc. Which of the following processes will you use to formalize
the acceptance of the completed project deliverables?
A. Verify scope
B. Report performance
C. Expert judgment
D. Perform quality control
Answer: A

certification GIAC   GCPM examen   GCPM examen   GCPM   GCPM examen

NO.25 You work as a project manager for Xxxx Inc. You are working on several projects. Your projects vary in
size and budget. You have to calculate the ratios of schedule and cost compared to plan, so that you can
compare relative schedule and cost performance of each project. Which of the following components of
EVM provide measures of schedule and cost performance that are not affected by the size of the project?
A. BAC and EAC
B. CPI and SPI
C. CV and SV
D. PV and EV
Answer: B

certification GIAC   GCPM examen   GCPM   GCPM   GCPM

NO.26 Which of the following is described in the statement below.?
"It is a group of sequential and related project phases that are defined by the organization and control
needs of the management or organizations concerned with the project, the nature of the project itself, and
the application area."
A. Verify scope
B. Project charter
C. Activity list
D. Project life cycle
Answer: D

GIAC   GCPM   certification GCPM   certification GCPM   GCPM

NO.27 Which of the following processes describes the statement below?
"It consists of the processes required to ensure that the project contains all the work required to complete
the project effectively."
A. Project communications management
B. Project scope management
C. Risk management
D. Project human resource management
Answer: B

GIAC   GCPM   GCPM   GCPM   GCPM

NO.28 Which of the following processes formally permits the initiation of a project and marks the kickoff for all
consequent development activities to begin?
A. Develop project scope statement
B. Develop project management plan
C. Develop project charter
D. Develop project team
Answer: C

GIAC   GCPM   certification GCPM

NO.29 You are the program manager for your project. You are working with the project managers regarding
the procurement processes for their projects. You have ruled out one particular contract type because it is
considered too risky for the program. Which one of the following contract types is usually considered to be
the most dangerous for the buyer?
A. Cost plus incentive fee
B. Time and materials
C. Cost plus percentage of costs
D. Fixed fee
Answer: C

GIAC examen   GCPM   GCPM   GCPM   GCPM   GCPM

NO.30 You are using the PDCA model to determine, implement, monitor, control, and maintain Information
Security Management System or ISMS. You have to evaluate the new processes and match up to the
results against the probable results to determine the differences. In which of the following phases of the
PDCA are you working?
A. Do
B. Act
C. Plan
D. Check
Answer: D

GIAC examen   GCPM examen   GCPM

Vous aurez le service de la mise à jour gratuite pendant un an une fois que vous achetez le produit de Pass4Test. Vous pouvez recevoir les notes immédiatement à propos de aucun changement dans le test ou la nouvelle Q&A sortie. Pass4Test permet tous les clients à réussir le test GIAC GCPM à la première fois.