Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GSEC GIAC Security Essentials Questions and Answers

Questions 4

How many clients Is a single WSUS server designed to support when the minimum system requirements are met?

Options:

A.

10000

B.

B. 5OOO

C.

1000

Buy Now
Questions 5

The Return on Investment (ROI) measurement used in Information Technology and Information Security fields is typically calculated with which formula?

Options:

A.

ROI = (gain - expenditure)/(expenditure) X 100%

B.

ROI = (gain + expenditure)/(expenditure) X 100%

C.

ROI = (loss + expenditure)/(expenditure) X 100%

D.

ROI = (loss - expenditure)/(expenditure) X 100%

Buy Now
Questions 6

Which of the following attack vectors are addressed by Xinetd and TCP Wrappers?

Options:

A.

Outsider attack from network

B.

Outsider attack from a telephone

C.

Insider attack from local network

D.

Attack from previously installed malicious code

E.

A and B

F.

A and C

G.

B and D

Buy Now
Questions 7

Which of the following heights of fence deters only casual trespassers?

Options:

A.

8 feet

B.

2 to 2.5 feet

C.

6 to 7 feet

D.

3 to 4 feet

Buy Now
Questions 8

Where is the source address located in an IPv4 header?

Options:

A.

At an offset of 20 bytes

B.

At an offset of 8 bytes

C.

At an offset of 16 bytes

D.

At an offset of 12 bytes

Buy Now
Questions 9

The Linux command to make the /etc/shadow file, already owned by root, readable only by root is which of the following?

Options:

A.

chmod 444/etc/shadow

B.

chown root: root/etc/shadow

C.

chmod 400/etc/shadow

D.

chown 400 /etc/shadow

Buy Now
Questions 10

Which of the following hardware devices prevents broadcasts from crossing over subnets?

Options:

A.

Bridge

B.

Hub

C.

Router

D.

Modem

Buy Now
Questions 11

Dilbert wants to have a script run on his Windows server every time Wally logs into it. Where should he place this script?

Options:

A.

HKEY_LOCAL_MACHINF\SOFTWARE\Mlcrosofl\Wlndows\CurrentVerslon\RunOnce

B.

Default Domain Policy > User Configuration > Windows Settings > Scripts (Logon/Logoff)

C.

HKEY.LOCAL MACHIN\SOFTWARE\Microsolt\Windows\CurrentVersion\Run

D.

Default Domain Policy > Computer Configuration > Windows Settings > Scripts (Startup/Shutdown)

Buy Now
Questions 12

Which Host-based IDS (HIDS) method of log monitoring utilizes a list of keywords or phrases that define the events of interest for the analyst, then takes a list of keywords to watch for and generates alerts when it sees matches in log file activity?

Options:

A.

Passive analysis

B.

Retroactive analysis

C.

Exclusive analysis

D.

Inclusive analysis

Buy Now
Questions 13

Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap.

What is the source port number?

GSEC Question 13

GSEC Question 13

Options:

A.

878733706

B.

123

C.

443

D.

878732274

E.

36480

F.

2398730476

G.

1432

Buy Now
Questions 14

Which of the following is TRUE regarding Ethernet?

Options:

A.

Stations are not required to monitor their transmission to check for collisions.

B.

Several stations are allowed to be transmitting at any given time within a single collision domain.

C.

Ethernet is shared media.

D.

Stations are not required to listen before they transmit.

Buy Now
Questions 15

Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?

Options:

A.

Eavesdropping attacks cannot be performed through concrete walls.

B.

Eavesdropping attacks can take place from miles away.

C.

Eavesdropping attacks are easily detected on wireless networks.

D.

Eavesdropping attacks require expensive devices.

Buy Now
Questions 16

What does Authentication Header (AH) add to the packet in order to prevent an attacker from lying about the source?

Options:

A.

Integrity Check Value

B.

AES-128 encryption

C.

Triple DES encryption

D.

32-bit sequence number

Buy Now
Questions 17

What Amazon Web Services (AWS) term describes a grouping of at least one datacenter with redundant power, high speed connections to other data centres and the Internet?

Options:

A.

Management subnet

B.

Availability zone

C.

Region

D.

virtual private cloud

Buy Now
Questions 18

Which of the following is an advantage of an Intrusion Detection System?

Options:

A.

It is a mature technology.

B.

It is the best network security.

C.

It never needs patching.

D.

It is a firewall replacement.

Buy Now
Questions 19

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company ' s network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:

A.

Take a full backup daily with the previous night ' s tape taken offsite.

B.

Take a full backup daily and use six-tape rotation.

C.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday ' s backup offsite.

D.

Take a full backup on alternate days and keep rotating the tapes.

E.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday ' s backup offsite.

F.

Take a full backup daily with one tape taken offsite weekly.

Buy Now
Questions 20

You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company ' s business systems?

Options:

A.

It may harm otherwise healthy systems.

B.

It may produce false negative results.

C.

It may generate false positive results.

D.

It may not return enough benefit for the cost.

Buy Now
Questions 21

Which Defense-in-Depth model involves identifying various means by which threats can become manifest and providing security mechanisms to shut them down?

Options:

A.

Vector-oriented

B.

Uniform protection

C.

Information centric defense

D.

Protected enclaves

Buy Now
Questions 22

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

usermod -s

B.

chage

C.

usermod -u

D.

useradd -s

Buy Now
Questions 23

What is the motivation behind SYN/FIN scanning?

Options:

A.

The SYN/FIN combination is useful for signaling to certain Trojans.

B.

SYN/FIN packets are commonly used to launch denial of service attacks against BSD hosts.

C.

The crafted SYN/FIN packet sometimes gets past firewalls and filtering routers.

D.

A SYN/FIN packet is used in session hijacking to take over a session.

Buy Now
Questions 24

Which of the following resources is a knowledge base of real-world observed adversary tactics and techniques?

Options:

A.

Lockheed Martin Cyber Kill Chain

B.

MITRE ATT & CK

C.

CIS C ontrols

D.

N I ST Framework

Buy Now
Questions 25

A folder D:\Files\Marketing has the following NTFS permissions:

• Administrators: Full Control

• Marketing: Change and Authenticated

• Users: Read

It has been shared on the server as " MARKETING " , with the following share permissions:

• Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

Options:

A.

No access

B.

Full Control

C.

Read

D.

Change

Buy Now
Questions 26

When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?

Options:

A.

The packets are probably corrupted.

B.

The packets may have been accidentally routed onto the Internet.

C.

The packets may be deliberately spoofed by an attacker.

D.

The packets are a sign of excess fragmentation.

E.

A and B

F.

B and C

G.

B and D

Buy Now
Questions 27

Which Linux file lists every process that starts at boot time?

Options:

A.

inetd

B.

netsrv

C.

initd

D.

inittab

Buy Now
Questions 28

If an attacker compromised a host on a site ' s internal network and wanted to trick other machines into using that host as the default gateway, which type of attack would he use?

Options:

A.

MAC Flooding

B.

CDP Manipulation

C.

Telnet Attack

D.

DHCP Spoofing

E.

VLAN Hopping

Buy Now
Questions 29

Based on the iptables output below, which type of endpoint security protection has host 192.168.1.17 implemented for incoming traffic on TCP port 22 (SSH) and TCP port 23 (telnet)?

GSEC Question 29

Options:

A.

Operating System Control Firewall

B.

Application Control Firewall

C.

Exclusive Logging Analysis

D.

Packet Filtering Firewall

E.

Application Execution Control

Buy Now
Questions 30

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Buy Now
Questions 31

The process of enumerating all hosts on a network defines which of the following activities?

Options:

A.

Port scanning

B.

Vulnerability scanning

C.

GPS mapping

D.

Network mapping

Buy Now
Questions 32

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:

A.

Halon

B.

CO2

C.

Soda acid

D.

Water

Buy Now
Questions 33

Which of the following is a Layer 3 device that will typically drop directed broadcast traffic?

Options:

A.

Hubs

B.

Bridges

C.

Routers

D.

Switches

Buy Now
Questions 34

What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?

Options:

A.

Risk of system crashes and security alerts .

B.

Risk of deletion of backup files.

C.

Risk of modified application configuration files .

D.

Risk of applying untested patches .

Buy Now
Questions 35

What advantage does a Client-to-Client VPN have over other types of VPNs?

Options:

A.

The traffic never traverses any network segment in clear text

B.

The client applications do not need to support cryptography

C.

Network devices do not have to look at the message content to provide QoS

D.

The VPN gateway is located at the edge of the corporate network

Buy Now
Questions 36

When discussing access controls, which of the following terms describes the process of determining the activities or functions that an Individual is permitted to perform?

Options:

A.

Authentication

B.

Identification

C.

Authorization

D.

Validation

Buy Now
Questions 37

Which file would the entry below be found in?

n e t.ipv6.conf.all.acctpt-r a =0

Options:

A.

/etcsysctl.conf

B.

/etc/crontab

C.

/etc/shadow

D.

/etc/hosts

E.

/etc/pam.d/system-auth

Buy Now
Questions 38

Which of the following terms refers to the process in which headers and trailers are added around user data?

Options:

A.

Encapsulation

B.

Authentication

C.

Authorization

D.

Encryption

Buy Now
Questions 39

An employee attempting to use your wireless portal reports receiving the error shown below. Which scenario is occurring?

GSEC Question 39

Options:

A.

A denial-of-service attack is preventing a response from the portal.

B.

Another access point is deauthenticating legitimate clients.

C.

The encrypted data is being intercepted and decrypted.

D.

Another access point is attempting to intercept the data.

Buy Now
Questions 40

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical

B.

Administrative

C.

Automatic

D.

Technical

Buy Now
Questions 41

Using PowerShell ISE running as an Administrator, navigate to the

C:\hlindows\security\tevplatesdirectory . Use secedit.exe in analyze mode to compare the temp.sdb and uorkstdtionSecureTmplate.inf files, and output the findings to a file called log.txt. Which configuration setting under Analyze User Rights reports a mismatch?

Hints:

Use files located in the C \windows\security\templates\ directory

The log. txt file will be created in the directory the secedit.exe command is run from

GSEC Question 41

GSEC Question 41

Options:

A.

RemoteAccess

B.

• S-l-5-32-544__ Members

C.

Enable Admin Account

D.

UseManger

E.

AuditSystemEvents

F.

AuditDSAccess.

G.

SeSecurityPrivilege

Buy Now
Questions 42

Which class of IDS events occur when the IDS fails to alert on malicious data?

Options:

A.

True Negative

B.

True Positive

C.

False Positive

D.

False Negative

Buy Now
Questions 43

Where could you go in Windows XP/2003 to configure Automatic Updates?

Options:

A.

Right click on the Start Menu and choose select Properties in the pop-up Menu.

B.

Open the MMC and choose the Automatic Updates snap-in.

C.

Right click on your desktop and choose the automatic updates.

D.

Go to the System applet in Control Panel and click on the Automatic Updates icon.

Buy Now
Questions 44

On which of the following OSI model layers does IPSec operate?

Options:

A.

Physical layer

B.

Network layer

C.

Data-link layer

D.

Session layer

Buy Now
Questions 45

In preparation to do a vulnerability scan against your company ' s systems. You ' ve taken the steps below:

You ' ve notified users that there will be a system test.

You ' ve priontized and selected your targets and subnets.

You ' ve configured the system to do a deep scan.

You have a member of your team on call to answer questions.

Which of the following is a necessary step to take prior to starting the scan?

Options:

A.

Placing the incident response team on call.

B.

Clear relevant system log files.

C.

Getting permission to run the scan.

D.

Scheduling the scan to run before OS updates.

Buy Now
Questions 46

If a Linux administrator wanted to quickly filter out extraneous data and find a running process named RootKit, which command could he use?

Options:

A.

cat/proc;grep Rootkit

B.

ps-ef/ grep Rootkit

C.

sed’s/Rootkit/g’/var/log/messages

D.

tail/var/log/messages > Rootkit

E.

top-u Rootkit

Buy Now
Questions 47

What is the main reason that DES is faster than RSA?

Options:

A.

DES is less secure.

B.

DES is implemented in hardware and RSA is implemented in software.

C.

Asymmetric cryptography is generally much faster than symmetric.

D.

Symmetric cryptography is generally much faster than asymmetric.

Buy Now
Questions 48

Which of the following processes is known as sanitization?

Options:

A.

Assessing the risk involved in discarding particular information.

B.

Verifying the identity of a person, network host, or system process.

C.

Physically destroying the media and the information stored on it.

D.

Removing the content from the media so that it is difficult to restore.

Buy Now
Questions 49

Where are user accounts and passwords stored in a decentralized privilege management environment?

Options:

A.

On a central authentication server.

B.

On more than one server.

C.

On each server.

D.

On a server configured for decentralized privilege management.

Buy Now
Questions 50

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Reduce power consumption

B.

Ease of maintenance

C.

Load balancing

D.

Failover

Buy Now
Questions 51

What security advantage does the utilization of a switch as opposed to a hub offer for a secure network design?

Options:

A.

A switch will make it possible to provide a physical separation of the cables used to

connect systems to the network.

B.

A switch will make it more difficult for an attacker that may control a compromised

system to be able to view traffic destined for other devices on the same logical network.

A switch will make it easier to deploy Intrusion detection or intrusion prevention

systems as a method of providing an additional layer of security to a proper secure

network design.

A switch will remove the need for utilization of a host-b

Buy Now
Questions 52

An organization keeps its intellectual property in a database. Protection of the data is assigned to one system administrator who marks the data, and monitors for this intellectual property leaving the network. Which defense-In-depth principle does this describe?

Options:

A.

Threat-Vector Analysis

B.

Protected Enclave

C.

Information Centric

D.

Uniform Protection

Buy Now
Questions 53

A database is accessed through an application that users must authenticate with, on a host that only accepts connections from a subnet where the business unit that uses the data is located. What defense strategy is this?

Options:

A.

Information Centric

B.

Threat Modeling

C.

Uniform Production

D.

Vector Oriented

Buy Now
Questions 54

You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

Options:

A.

A firewall is blocking him.

B.

His laptop is incompatible.

C.

MAC filtering is blocking him.

D.

His operating system is incompatible.

Buy Now
Questions 55

Which of the following is the reason of using Faraday cage?

Options:

A.

To prevent Denial-of-Service (DoS) attack

B.

To prevent shoulder surfing

C.

To prevent mail bombing

D.

To prevent data emanation

Buy Now
Questions 56

Which of the following is a Personal Area Network enabled device?

Options:

A.

Corporate access point extender

B.

Bluetooth mouse

C.

Home Win router

D.

Network enabled printer

Buy Now
Questions 57

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Hardening

B.

Authentication

C.

Cryptography

D.

Sanitization

Buy Now
Questions 58

Your customer wants to make sure that only computers he has authorized can get on his Wi-Fi. What is the most appropriate security measure you can recommend?

Options:

A.

A firewall

B.

WPA encryption

C.

WEP encryption

D.

Mac filtering

Buy Now
Questions 59

What is the process of simultaneously installing an operating system and a Service Pack called?

Options:

A.

Synchronous Update

B.

Slipstreaming

C.

Simultaneous Update

D.

Synchronizing

Buy Now
Questions 60

What is the maximum number of connections a normal Bluetooth device can handle at one time?

Options:

A.

2

B.

4

C.

1

D.

8

E.

7

Buy Now
Questions 61

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

Options:

A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Buy Now
Questions 62

What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?

Options:

A.

These fields are decremented each time a packet is retransmitted to minimize the possibility of routing loops.

B.

These fields are initialized to an initial value to prevent packet fragmentation and fragmentation attacks.

C.

These fields are recalculated based on the required time for a packet to arrive at its destination.

D.

These fields are incremented each time a packet is transmitted to indicate the number of routers that an IP packet has traversed.

Buy Now
Questions 63

A US case involving malicious code is brought to trial. An employee had opened a helpdesk ticket to report specific instances of strange behavior on her system. The IT helpdesk representative collected information by interviewing the user and escalated the ticket to the system administrators. As the user had regulated and sensitive data on her computer, the system administrators had the hard drive sent to the company ' s forensic consultant for analysis and configured a new hard drive for the user. Based on the recommendations from the forensic consultant and the company ' s legal department, the CEO decided to prosecute the author of the malicious code. During the court case, which of the following would be able to provide direct evidence?

Options:

A.

The IT helpdesk representative

B.

The company CEO

C.

The user of the infected system

D.

The system administrator who removed the hard drive

Buy Now
Questions 64

How many bytes does it take to represent the hexadecimal value OxFEDCBA?

Options:

A.

12

B.

2

C.

3

D.

6

Buy Now
Questions 65

A VPC is created with a CIDR block of 10.22.0.0/16, which of the following private subnets could be Included?

Options:

A.

10.23.0.0/16

B.

10.22.12.0/24

C.

10.23.12.0/26

D.

10.10.10.0/24

Buy Now
Questions 66

You have an automated system for patching the operating systems of all your computers. All patches are supposedly current. Yet your automated vulnerability scanner has just reported vulnerabilities that you believe have been patched. Which of the actions below should you take next?

Options:

A.

Check some systems manually.

B.

Rerun the system patching routines.

C.

Contact the incident response team.

D.

Ignore the findings as false positives.

Buy Now
Questions 67

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as.

Options:

A.

False negative

B.

False positive

C.

True positive

D.

True negative

Buy Now
Questions 68

How can an adversary utilize a stolen database of unsalted password hashes?

Options:

A.

Decrypt them to find the dear text passwords

B.

Compare the hashed output of guessed passwords with them

C.

Authenticate with the service associated with the on-line database

D.

Reverse engineer them to find the encryption key

Buy Now
Questions 69

Which of the following is referred to as Electromagnetic Interference (EMI)?

Options:

A.

Electrical line noise

B.

Spike

C.

Transient

D.

Brownout

Buy Now
Questions 70

Analyze the file below. When will the program / home/sink/utils/remove temp hies.py run?

GSEC Question 70

Options:

A.

When a user requests it by connecting to the listening port

B.

When the user ' sink ' logs in

C.

At startup when the system enters the multi-user runlevel

D.

At the time specified in the crontab file

Buy Now
Questions 71

You are going to upgrade your hard disk ' s file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTFS gives better file security than FAT16 and FAT32.

B.

Automatic backup.

C.

NTFS file system supports for larger hard disks.

D.

NTFS give improved disk compression than FAT16 and FAT32.

Buy Now
Questions 72

You have implemented a firewall on the company ' s network for blocking unauthorized network connections. Which of the following types of security control is implemented in this case?

Options:

A.

Detective

B.

Preventive

C.

Directive

D.

Corrective

Buy Now
Questions 73

Which of the following Microsoft services integrates SSO into Microsoft 365 by syncing with on-premises servers?

Options:

A.

Intune

B.

Azure AD Connect

C.

Teams

D.

Azure Key Vault

Buy Now
Questions 74

Which of the following Unix syslog message priorities is the MOST severe?

Options:

A.

err

B.

emerg

C.

crit

D.

alert

Buy Now
Questions 75

Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

Options:

A.

Application

B.

System

C.

Startup

D.

Security

Buy Now
Questions 76

Why would someone use port 80 for deployment of unauthorized services?

Options:

A.

Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue service.

B.

If someone were to randomly browse to the rogue port 80 service they could be compromised.

C.

This is a technique commonly used to perform a denial of service on the local web server.

D.

HTTP traffic is usually allowed outbound to port 80 through the firewall in most environments.

Buy Now
Questions 77

What is the most secure way to address an unused Windows service so it cannot be exploited by malware?

Options:

A.

Firewall it

B.

Set to manual startup

C.

Disable it

D.

Uninstall it

Buy Now
Questions 78

You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of " no operation " (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

Options:

A.

Limits on the number of failed logins

B.

Boundary checks on program inputs

C.

Controls against time of check/time of use attacks

D.

Restrictions on file permissions

Buy Now
Questions 79

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company ' s management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

Options:

A.

The laptop users will be able to use smart cards for getting authenticated.

B.

Both tasks will be accomplished.

C.

None of the tasks will be accomplished.

D.

The wireless network communication will be secured.

Buy Now
Questions 80

Which of the following Linux commands can change both the username and group name a file belongs to?

Options:

A.

chown

B.

chgrp

C.

chmod

D.

newgrp

Buy Now
Questions 81

Which of the following access control principles helps prevent collusion and detect abuse of access?

Options:

A.

Least privilege

B.

Rotation of duties

C.

Separation of duties

D.

Need to know

Buy Now
Questions 82

You have set up a local area network for your company. Your firewall separates your network into several sections: a DMZ with semi-public servers (web, dns, email) and an intranet with private servers. A penetration tester gains access to both sections and installs sniffers in each. He is able to capture network traffic for all the devices in the private section but only for one device (the device with the sniffer) in the DMZ. What can be inferred about the design of the system?

Options:

A.

You installed a router in the private section and a switch in the DMZ

B.

You installed a hub in the private section and a switch in the DMZ

C.

You installed a switch in the private section and a hub in the DMZ

D.

You installed a switch in the private section and a router in the DMZ

Buy Now
Questions 83

Which AWS service integrates with the Amazon API Gateway to provision and renew TLS encryption needs for data in transit?

Options:

A.

Certificate Manager

B.

Key Management Server

C.

Web Application firewall

D.

Security Token Service

Buy Now
Questions 84

Use PowerShell ISE to

e xamin e C:\Windows\security\templates\WorkstationSecureTemplate.inf. Which setting is configured in the template?

GSEC Question 84

GSEC Question 84

Options:

A.

ResetLockoutCount

B.

NewAdministratorName

C.

MinirnumPasswordAge

D.

Require logonToChangoPassword

E.

SeRemotPlnteractiveLogonRlght

F.

MaxRenewAge

G.

AuditSystemEvents

Buy Now
Questions 85

While building multiple virtual machines on a single host operating system, you have determined that each virtual machine needs to work on the network as a separate entity with its own unique IP address on the same logical subnet. You also need to limit each guest operating system to how much system resources it has access to. Which of the following correctly identifies steps that must be taken towards setting up these virtual environments?

Options:

A.

The virtual machine software must define a separate virtual network Interface to each virtual machine and then define which unique logical hard drive partition should be available to the guest operating system.

B.

The virtual machine software must define a separate virtual network interface since each system needs to have an IP address on the same logical subnet requiring they use the same physical interface on the host operating system.

C.

The virtual machine software must define a separate virtual network interface to each virtual machine as well as how much RAM should be available to each virtual machine.

D.

The virtual machine software establishes the existence of the guest operating systems and the physical system resources to be used by that system will be configured from within the guest operating system.

E.

The virtual machine software must define a separate physical network interface to each virtual machine so that the guest operating systems can have unique IP addresses and then define how much of the systems RAM is available to the guest operating system.

Buy Now
Questions 86

Which of the following is a benefit of using John the Ripper for auditing passwords?

Options:

A.

John ' s Blowfish cracking routine uses a complex central computing loop that increases the cost of each hash computation.

B.

John the Ripper is much slower for auditing passwords encrypted with MD5 and Blowfish.

C.

John ' s MD5 cracking routine uses a simplified central computing loop that decreases the cost of each hash computation.

D.

John cannot use the DES bit-slicing technique, so it is much slower than other tools, especially when used against DES-encrypted passwords.

Buy Now
Questions 87

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

smbmount

B.

mount smb

C.

smbfsmount

D.

mount -t smbfs

Buy Now
Questions 88

Which of the following is a required component for successful 802.lx network authentication?

Options:

A.

Supplicant

B.

3rd-party Certificate Authority

C.

Ticket Granting Server (TGS)

D.

IPSec

Buy Now
Questions 89

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

Options:

A.

netstat -a | grep FTP

B.

FTP netstat -r

C.

FTP netstat -a

D.

netstat -r | grep FTP

Buy Now
Questions 90

During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)?

Options:

A.

Key Recovery

B.

Initialization

C.

Registration

D.

Certification

Buy Now
Questions 91

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

Options:

A.

NAT

B.

State Table

C.

Logging

D.

Content filtering

Buy Now
Questions 92

While using Wire shark to investigate complaints of users being unable to login to a web application, you come across an HTTP POST submitted through your web application. The contents of the POST are listed below. Based on what you see below, which of the following would you recommend to prevent future damage to your database?

GSEC Question 92

Options:

A.

Use ssh to prevent a denial of service attack

B.

Sanitize user inputs to prevent injection attacks

C.

Authenticate users to prevent hackers from using your database

D.

Use https to prevent hackers from inserting malware

Buy Now
Questions 93

What is SSL primarily used to protect you against?

Options:

A.

Session modification

B.

SQL injection

C.

Third-patty sniffing

D.

Cross site scripting

Buy Now
Questions 94

Critical information is encrypted within an application accessible only to a small group of administrators, with a separate group of administrators holding the decryption keys. What Defense in Depth approach is being used?

Options:

A.

Information-Centric

B.

Uniform Protection

C.

Protected Enclaves

D.

Threat Vector Analysis

Buy Now
Questions 95

The Windows ' tracert ' begins by sending what type of packet to the destination host?

Options:

A.

A UDP packet with a TTL of 1

B.

An ICMP Echo Request

C.

An ICMP Router Discovery

D.

An ICMP Echo Reply

Buy Now
Questions 96

What is the name of the registry key that is used to manage remote registry share permissions for the whole registry?

Options:

A.

regkey

B.

regmng

C.

winreg

D.

rrsreg

Buy Now
Questions 97

In an Active Directory domain, which is the preferred method of keeping host computers patched?

Options:

A.

Deliver updates from a local server through Windows Server Update Services

B.

Deliver updates through a web caching proxy for faster installation

C.

Configure Microsoft Update to run automatically on each host

D.

Download Hotfixes daily, and Service packs monthly, for each operating system.

Buy Now
Questions 98

What file instructs programs like Web spiders NOT to search certain areas of a site?

Options:

A.

Robots.txt

B.

Restricted.txt

C.

Spider.txt

D.

Search.txt

Buy Now
Questions 99

Which of the following statements about DMZ are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the boundary between the Internet and a private network.

B.

It is an anti-virus software that scans the incoming traffic on an internal network.

C.

It contains company resources that are available on the Internet, such as Web servers and

FTP servers.

D.

It contains an access control list (ACL).

Buy Now
Questions 100

Which of the following statements about Microsoft ' s VPN client software is FALSE?

Options:

A.

The VPN interface can be figured into the route table.

B.

The VPN interface has the same IP address as the interface to the network it ' s been specified to protect.

C.

The VPN client software is built into the Windows operating system.

D.

The VPN tunnel appears as simply another adapter.

Buy Now
Questions 101

What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?

Options:

A.

Decode the message by decrypting the asymmetric key with his private key, then using the asymmetric key to decrypt the message.

B.

Decode the message by decrypting the symmetric key with his private key, then using the symmetric key to decrypt the message.

C.

Decode the message by decrypting the symmetric key with his public key, then using the symmetric key to decrypt the message.

D.

Decrypt the message by encrypting the digital signature with his private key, then using the digital signature to decrypt the message.

Buy Now
Questions 102

Which of the following protocols implements VPN using IPSec?

Options:

A.

SLIP

B.

PPP

C.

L2TP

D.

PPTP

Buy Now
Questions 103

What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

Options:

A.

Camera Recordings

B.

Security guards

C.

Encryption

D.

Shredding

E.

Corrective Controls

Buy Now
Questions 104

The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?

Options:

A.

The apt-get upgrade command doesn ' t work with the cron command because of incompatibility

B.

Relying on vendor and 3rd party email lists enables updates via email, for even faster patching

C.

Automated patching of production servers without prior testing may result in unexpected behavior or failures

D.

The command apt-get upgrade is incorrect, you need to run the apt-get update command

Buy Now
Questions 105

Which of the four basic transformations in the AES algorithm involves the leftward circular movement of state data?

Options:

A.

SubBytes

B.

MixColumns

C.

AddRoundKey

D.

Shift Rows

Buy Now
Questions 106

What would the file permission example " rwsr-sr-x " translate to in absolute mode?

Options:

A.

1755

B.

6755

C.

6645

D.

1644

Buy Now
Questions 107

Which of the following choices accurately describes how PGP works when encrypting email?

Options:

A.

PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric key.

B.

PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient ' s public key

C.

PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient ' s public key

D.

PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric key.

Buy Now
Questions 108

Which of the following items are examples of preventive physical controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Biometric access controls

B.

Closed-circuit television monitors

C.

Fire extinguishers

D.

Locks and keys

Buy Now
Questions 109

What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?

Options:

A.

Template application should be done remotely

B.

Templates must be received from a domain controller

C.

Template application requires domain administrator rights

D.

Template application cannot be automatically reversed

Buy Now
Questions 110

When file integrity checking is enabled, what feature is used to determine if a monitored file has been modified?

Options:

A.

file size

B.

Last modified dale

C.

File change notifications in the Application Event Log

D.

One-way hash

Buy Now
Questions 111

Which of the following should be implemented to protect an organization from spam?

Options:

A.

Auditing

B.

System hardening

C.

E-mail filtering

D.

Packet filtering

Buy Now
Questions 112

Which command would allow an administrator to determine if a RPM package was already installed?

Options:

A.

rpm -s

B.

rpm -q

C.

rpm -a

D.

rpm -t

Buy Now
Questions 113

Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?

Options:

A.

Vulnerability scanner and auditing tool

B.

Auditing tool and alerting system

C.

Configuration management and alerting system

D.

Security patching and vulnerability scanner

Buy Now
Questions 114

If Linux server software is a requirement in your production environment which of the following should you NOT utilize?

Options:

A.

Debian

B.

Mandrake

C.

Cygwin

D.

Red Hat

Buy Now
Questions 115

A system administrator sees the following URL in the webserver logs:

GSEC Question 115

Which action will mitigate against this attack?

Options:

A.

Force all web applications to use SSL/US

B.

Encode web traffic using Base64 before transmission

C.

Filter potentially harmful characters from user input

D.

Authenticate users before allowing database queries

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Last Update: May 24, 2026
Questions: 385

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now GSEC testing engine

PDF (Q&A)

$54.99  $157.11
buy now GSEC pdf