How Many Questions Of GSEC Test

Proper study guides for Abreast of the times GIAC GIAC Security Essentials Certification certified begins with GIAC GSEC preparation products which designed to deliver the Printable GSEC questions by making you pass the GSEC test at your first time. Try the free GSEC demo right now.

Free GSEC Demo Online For GIAC Certifitcation:

NEW QUESTION 1
When trace route fails to get a timely response for a packet after three tries, which action will it take?

  • A. It will print '* * *' for the attempts and increase the maximum hop count by on
  • B. It will exit gracefully, and indicate to the user that the destination is unreachabl
  • C. It will increase the timeout for the hop and resend the packet
  • D. It will print '* * *' for the attempts, increment the TTL and try again until the maximum hop coun

Answer: D

NEW QUESTION 2
A folder D:\Files\Marketing has the following NTFS permissions:
. Administrators: Full Control
. Marketing: Change and Authenticated
. Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
. Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

  • A. No access
  • B. Full Control
  • C. Read
  • D. Change

Answer: C

NEW QUESTION 3
Which of the following is an advantage of private circuits versus VPNs?

  • A. Flexibility
  • B. Performance guarantees
  • C. Cost
  • D. Time required to implement

Answer: B

NEW QUESTION 4
Which of the following would be a valid reason to use a Windows workgroup?

  • A. Lower initial cost
  • B. Simplicity of single sign-on
  • C. Centralized control
  • D. Consistent permissions and rights

Answer: D

NEW QUESTION 5
What protocol is a WAN technology?

  • A. 802.11
  • B. 802.3
  • C. Ethernet
  • D. Frame Relay

Answer: D

NEW QUESTION 6
Which of the following items are examples of preventive physical controls? Each correct answer represents a complete solution. Choose three.

  • A. Biometric access controls
  • B. Closed-circuit television monitors
  • C. Fire extinguishers
  • D. Locks and keys

Answer: ACD

NEW QUESTION 7
What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?

  • A. Decode the message by decrypting the asymmetric key with his private key, then using the asymmetric key to decrypt the messag
  • B. Decode the message by decrypting the symmetric key with his private key, then using the symmetric key to decrypt the messag
  • C. Decode the message by decrypting the symmetric key with his public key, then using the symmetric key to decrypt the messag
  • D. Decrypt the message by encrypting the digital signature with his private key, then using the digital signature to decrypt the messag

Answer: A

NEW QUESTION 8
Which of the following statements would be seen in a Disaster Recovery Plan?

  • A. "Instructions for notification of the media can be found in Appendix A"
  • B. "The Emergency Response Plan should be executed in the case of any physical disaster listed on page 3."
  • C. "The target for restoration of business operations is 72 hours from the declaration of disaster."
  • D. "After arriving at the alternate site, utilize the server build checklist to rebuild all servers on the server rebuild list."

Answer: D

NEW QUESTION 9
What is the first thing that should be done during the containment step of incident handling?

  • A. Change all the passwords
  • B. Secure the area
  • C. Prepare the Jump bag
  • D. Notify management
  • E. Prepare a report

Answer: B

NEW QUESTION 10
If the NET_ID of the source and destination address in an IP (Internet Protocol) packet match, which answer BEST describes the routing method the sending host will use?

  • A. Local (or direct) routing
  • B. Circuit switch routing
  • C. Dynamic (or changeable) routing
  • D. Remote (or indirect) routing

Answer: A

NEW QUESTION 11
When designing wireless networks, one strategy to consider is implementing security mechanisms at all layers of the OSI model. Which of the following protection mechanisms would protect layer 1?

  • A. Hardening applications
  • B. Limit RF coverage
  • C. Employing firewalls
  • D. Enabling strong encryption

Answer: B

NEW QUESTION 12
Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?

  • A. Detective
  • B. Preventive
  • C. Responsive
  • D. Corrective

Answer: D

NEW QUESTION 13
What is the maximum number of connections a normal Bluetooth device can handle at one time?

  • A. 2
  • B. 4
  • C. 1
  • D. 8
  • E. 7

Answer: E

NEW QUESTION 14
Which of the following statements about DMZ are true?
Each correct answer represents a complete solution. Choose two.

  • A. It is the boundary between the Internet and a private networ
  • B. It is an anti-virus software that scans the incoming traffic on an internal networ
  • C. It contains company resources that are available on the Internet, such as Web servers and FTP server
  • D. It contains an access control list (ACL).

Answer: AC

NEW QUESTION 15
Which layer of the TCP/IP Protocol Stack Is responsible for port numbers?

  • A. Network
  • B. Transport
  • C. Internet
  • D. Application

Answer: B

NEW QUESTION 16
The Windows 'tracert' begins by sending what type of packet to the destination host?

  • A. A UDP packet with a TTL of 1
  • B. An ICMP Echo Request
  • C. An ICMP Router Discovery
  • D. An ICMP Echo Reply

Answer: A

NEW QUESTION 17
What is the discipline of establishing a known baseline and managing that condition known as?

  • A. Condition deployment
  • B. Observation discipline
  • C. Security establishment
  • D. Configuration management

Answer: C

NEW QUESTION 18
Which of the following types of computers is used for attracting potential intruders?

  • A. Files pot
  • B. Honey pot
  • C. Data pot
  • D. Bastion host

Answer: B

NEW QUESTION 19
......

P.S. Surepassexam now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.surepassexam.com/GSEC-exam-dumps.html (279 New Questions)