A Review Of Pinpoint GSEC Exam
Your success in GIAC GSEC is our sole target and we develop all our GSEC braindumps in a way that facilitates the attainment of this target. Not only is our GSEC study material the best you can find, it is also the most detailed and the most updated. GSEC Practice Exams for GIAC GSEC are written to the highest standards of technical accuracy.
Online GIAC GSEC free dumps demo Below:
NEW QUESTION 1
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?
- A. TCP port 443
- B. UDP port 161
- C. TCP port 110
- D. UDP port 1701
Answer: D
NEW QUESTION 2
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
- A. 443
- B. 22
- C. 21
- D. 80
Answer: B
NEW QUESTION 3
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
- A. VPN
- B. MMZ
- C. VLAN
- D. DMZ
Answer: D
NEW QUESTION 4
What would the file permission example "rwsr-sr-x" translate to in absolute mode?
- A. 1755
- B. 6755
- C. 6645
- D. 1644
Answer: B
NEW QUESTION 5
What is TRUE about Workgroups and Domain Controllers?
- A. By default all computers running Windows 2008 can only form Domain Controllers not Workgroups
- B. Workgroups are characterized by higher costs while Domain Controllers by lower costs
- C. You cannot have stand-alone computers in the midst of other machines that are members of a domain
- D. Workgroup computers cannot share resources, only computers running on the same domain can
- E. You can have stand-alone computers in the midst of other machines that are members of a domai
Answer: E
NEW QUESTION 6
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
- A. Visitors
- B. Customers
- C. Employees
- D. Hackers
Answer: C
NEW QUESTION 7
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.uCertify.com. What is the most likely cause?
- A. DNS entry is not available for the host nam
- B. The site's Web server is offlin
- C. The site's Web server has heavy traffi
- D. WINS server has no NetBIOS name entry for the serve
Answer: A
NEW QUESTION 8
Which of the following elements is the most important requirement to ensuring the success of a business continuity plan?
- A. Disaster Recover Plans
- B. Anticipating all relevant threats
- C. Executive buy-in
- D. Clearly defining roles and responsibilities
- E. Training
Answer: C
NEW QUESTION 9
Which of the following monitors program activities and modifies malicious activities on a system?
- A. Back door
- B. HIDS
- C. NIDS
- D. RADIUS
Answer: B
NEW QUESTION 10
Which common firewall feature can be utilized to generate a forensic trail of evidence and
to identify attack trends against your network?
- A. NAT
- B. State Table
- C. Logging
- D. Content filtering
Answer: C
NEW QUESTION 11
Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?
- A. Analysis of encrypted traffic
- B. Provide insight into network traffic
- C. Detection of network operations problems
- D. Provide logs of network traffic that can be used as part of other security measure
- E. Inexpensive to manage
- F. B, C, and D
- G. A, C, and E
- H. B, D, and E
- I. A, B, and C
Answer: C
NEW QUESTION 12
What is the name of the command-line tool for Windows that can be used to manage audit policies on remote systems?
- A. SECEDTT.EXE
- B. POLCLI.EXE
- C. REMOTEAUDIT.EXE
- D. AUDITPOL.EXE
Answer: D
NEW QUESTION 13
Which of the following statements about IPSec are true?
Each correct answer represents a complete solution. Choose two.
- A. It uses Internet Protocol (IP) for data integrit
- B. It uses Authentication Header (AH) for data integrit
- C. It uses Password Authentication Protocol (PAP) for user authenticatio
- D. It uses Encapsulating Security Payload (ESP) for data confidentialit
Answer: BD
NEW QUESTION 14
Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?
Each correct answer represents a complete solution. Choose two.
- A. The client can optionally authenticate the serve
- B. The client always authenticates the serve
- C. The server always authenticates the clien
- D. The server can optionally authenticate the clien
Answer: BD
NEW QUESTION 15
In addition to securing the operating system of production honey pot hosts, what is recommended to prevent the honey pots from assuming the identities of production systems that could result in the denial of service for legitimate users?
- A. Deploy the honey pot hosts as physically close as possible to production system
- B. Deploy the honey pot hosts in an unused part of your address spac
- C. Deploy the honey pot hosts to only respond to attack
- D. Deploy the honey pot hosts on used address spac
Answer: B
NEW QUESTION 16
Which of the following is an advantage of an Intrusion Detection System?
- A. It is a mature technolog
- B. It is the best network securit
- C. It never needs patchin
- D. It is a firewall replacemen
Answer: A
NEW QUESTION 17
Which of the following TCP dump output lines indicates the first step in the TCP 3-way handshake?
- A. 07:09:43.368615 download.net 39904 > ftp.com.21: S 733381829:733381829(0) win 8760 <mss 1460> (DF)
- B. 07:09:43.370302 ftp.com.21 > download.net.39904: S 1192930639:1192930639(0} ack 733381830 win 1024 <mss 1460> (DF)
- C. 09:09:22.346383 ftp.com.21 > download.net.39904: , rst 1 win 2440(DF)
- D. 07:09:43.370355 download.net.39904 > ftp.com.21: , ack 1 win 8760 (DF)
Answer: A
NEW QUESTION 18
Which of the following is an Implementation of PKI?
- A. SSL
- B. 3DES
- C. Kerberos
- D. SHA-1
Answer: A
NEW QUESTION 19
......
P.S. Dumpscollection.com now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.dumpscollection.net/dumps/GSEC/ (279 New Questions)