Certbus > GIAC > GIAC Information Security > GSEC > GSEC Online Practice Questions and Answers

GSEC Online Practice Questions and Answers

Questions 4

There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?

A. Provides end-to-end data delivery service for user applications

B. Handles the routing of the data packets over the network

C. Manages IP addressing and encryption for data packets

D. Defines the procedures for interfacing with Ethernet devices

Browse 384 Q&As
Questions 5

Which of the following is a benefit to utilizing Cygwin for Windows?

A. The ability to install a complete Red Hat operating system Install on Windows.

B. The ability to bring much more powerful scripting capabilities to Windows.

C. The ability to run a production Apache server.

D. The ability to install a complete Ubuntu operating system install on Windows.

Browse 384 Q&As
Questions 6

Which of the following elements is the most important requirement to ensuring the success of a business continuity plan?

A. Disaster Recover Plans

B. Anticipating all relevant threats

C. Executive buy-in

D. Clearly defining roles and responsibilities

E. Training

Browse 384 Q&As
Questions 7

Which of the following would be a valid reason to use a Windows workgroup?

A. Lower initial cost

B. Simplicity of single sign-on

C. Centralized control

D. Consistent permissions and rights

Browse 384 Q&As
Questions 8

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

A. The Security ID numbers (SIDs) of all the groups to which you belong

B. A list of cached authentications

C. A list of your domain privileges

D. The Security ID numbers (SIDs) of all authenticated local users

Browse 384 Q&As
Questions 9

If you do NOT have an original file to compare to, what is a good way to identify steganography in potential carrier files?

A. Determine normal properties through methods like statistics and look for changes

B. Determine normal network traffic patterns and look for changes

C. Find files with the extension .stg

D. Visually verify the files you suspect to be steganography messages

Browse 384 Q&As
Questions 10

The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?

A. The apt-get upgrade command doesn't work with the cron command because of incompatibility

B. Relying on vendor and 3rd party email lists enables updates via email, for even faster patching

C. Automated patching of production servers without prior testing may result in unexpected behavior or failures

D. The command apt-get upgrade is incorrect, you need to run the apt-get update command

Browse 384 Q&As
Questions 11

Which of the following is NOT typically used to mitigate the war dialing threat?

A. Setting up monitored modems on special phone numbers

B. Setting modems to auto-answer mode

C. Proactively scanning your own phone numbers

D. Monitoring call logs at the switch

Browse 384 Q&As
Questions 12

It is possible to sniff traffic from other hosts on a switched Ethernet network by impersonating which type of network device?

A. Switch

B. Bridge

C. Hub

D. Router

Browse 384 Q&As
Questions 13

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true? Each correct answer represents a complete solution. Choose two.

A. The client can optionally authenticate the server.

B. The client always authenticates the server.

C. The server always authenticates the client.

D. The server can optionally authenticate the client.

Browse 384 Q&As
Questions 14

Which of the following is the reason of using Faraday cage?

A. To prevent Denial-of-Service (DoS) attack

B. To prevent shoulder surfing

C. To prevent mail bombing

D. To prevent data emanation

Browse 384 Q&As
Questions 15

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

A. killall

B. ps

C. getpid

D. kill

Browse 384 Q&As
Questions 16

Which port category does the port 110 fall into?

A. Well known port

B. Dynamic port

C. Private port

D. Application port

Browse 384 Q&As
Questions 17

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A. usermod -s

B. chage

C. usermod -u

D. useradd -s

Browse 384 Q&As
Questions 18

You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network?

A. APIPA

B. LMHOSTS

C. DNS

D. DHCP

E. WINS

Browse 384 Q&As
Exam Code: GSEC
Exam Name: GIAC Security Essentials Certification
Last Update: Apr 28, 2024
Questions: 384 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99