A Review Of 100% Guarantee GSEC Exam Prep

Approved of GSEC test question materials and exam topics for GIAC certification for IT learners, Real Success Guaranteed with Updated GSEC pdf dumps vce Materials. 100% PASS GIAC Security Essentials Certification exam Today!

Free GSEC Demo Online For GIAC Certifitcation:

NEW QUESTION 1
Which of the following is a type of countermeasure that can be deployed to ensure that a threat vector does not meet a vulnerability?

  • A. Prevention controls
  • B. Detection controls
  • C. Monitoring controls
  • D. Subversive controls

Answer: A

NEW QUESTION 2
Which of the following is more commonly used for establishing high-speed backbones that interconnect smaller networks and can carry signals over significant distances?

  • A. Bluetooth
  • B. Ethernet
  • C. Token ring
  • D. Asynchronous Transfer Mode (ATM)

Answer: D

NEW QUESTION 3
Which of the following applications cannot proactively detect anomalies related to a computer?

  • A. Firewall installed on the computer
  • B. NIDS
  • C. HIDS
  • D. Anti-virus scanner

Answer: B

NEW QUESTION 4
Why are false positives such a problem with IPS technology?

  • A. File integrity is not guarantee
  • B. Malicious code can get into the networ
  • C. Legitimate services are not delivere
  • D. Rules are often misinterprete

Answer: D

NEW QUESTION 5
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

  • A. A firewall is blocking hi
  • B. His laptop is incompatibl
  • C. MAC filtering is blocking hi
  • D. His operating system is incompatibl

Answer: C

NEW QUESTION 6
You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

  • A. killall httpd
  • B. endall httpd
  • C. kill httpd
  • D. end httpd

Answer: A

NEW QUESTION 7
Which of the following SIP INVITE lines indicates to the remote registrar the VoIP phone that initiated the call?

  • A. Via
  • B. To
  • C. From-Agent
  • D. User-Agent

Answer: D

NEW QUESTION 8
What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

  • A. These attacks work against relatively idle server
  • B. These attacks rely on a modified TCP/IP stack to functio
  • C. These attacks can be easily traced back to the sourc
  • D. These attacks only work against Linux/Unix host

Answer: A

NEW QUESTION 9
Which of the following choices accurately describes how PGP works when encrypting email?

  • A. PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric ke
  • B. PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key
  • C. PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key
  • D. PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric ke

Answer: B

NEW QUESTION 10
Which port category does the port 110 fall into?

  • A. Well known port
  • B. Dynamic port
  • C. Private port
  • D. Application port

Answer: A

NEW QUESTION 11
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. rm private.txt #11 Nov 2009 02:59:58 am
  • B. touch -d "11 Nov 2009 02:59:58 am" private.txt
  • C. touch private.txt #11 Nov 2009 02:59:58 am
  • D. touch -t 200911110259.58 private.txt

Answer: BD

NEW QUESTION 12
Which of the following is a characteristic of hash operations?

  • A. Asymmetric
  • B. Non-reversible
  • C. Symmetric
  • D. Variable length output

Answer: D

NEW QUESTION 13
You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?

  • A. ls <new root> <command>
  • B. chroot <new root> <command>
  • C. route <new root> <command>
  • D. chdir <new root> <command>

Answer: B

NEW QUESTION 14
You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:
The wireless network communication should be secured.
The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:
Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

  • A. The laptop users will be able to use smart cards for getting authenticate
  • B. Both tasks will be accomplishe
  • C. None of the tasks will be accomplishe
  • D. The wireless network communication will be secure

Answer: D

NEW QUESTION 15
What would the following IP tables command do?
IP tables -I INPUT -s 99.23.45.1/32 -j DROP

  • A. Drop all packets from the source address
  • B. Input all packers to the source address
  • C. Log all packets to or from the specified address
  • D. Drop all packets to the specified address

Answer: A

NEW QUESTION 16
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

  • A. Take a full backup daily with the previous night's tape taken offsit
  • B. Take a full backup daily and use six-tape rotatio
  • C. Take a full backup on Monday and an incremental backup on each of the following weekday
  • D. Keep Monday's backup offsit
  • E. Take a full backup on alternate days and keep rotating the tape
  • F. Take a full backup on Monday and a differential backup on each of the following weekday
  • G. Keep Monday's backup offsit
  • H. Take a full backup daily with one tape taken offsite weekl

Answer: A

NEW QUESTION 17
Which of the following protocols implements VPN using IPSec?

  • A. SLIP
  • B. PPP
  • C. L2TP
  • D. PPTP

Answer: C

NEW QUESTION 18
Against policy, employees have installed Peer-to-Peer applications on their workstations and they are using them over TCP port 80 to download files via the company network from other Peer-to-Peer users on the Internet. Which of the following describes this threat?

  • A. Firewall subversion
  • B. Backdoor installation
  • C. Malicious software infection
  • D. Phishing attempt

Answer: A

NEW QUESTION 19
......

Thanks for reading the newest GSEC exam dumps! We recommend you to try the PREMIUM Dumps-files.com GSEC dumps in VCE and PDF here: https://www.dumps-files.com/files/GSEC/ (279 Q&As Dumps)