GSEC | All About Accurate GSEC Test Question

It is impossible to pass GIAC GSEC exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed GIAC GSEC practice questions. You will get a surprising result by our Improved GIAC Security Essentials Certification practice guides.

Online GIAC GSEC free dumps demo Below:

NEW QUESTION 1
On which of the following OSI model layers does IPSec operate? A. Physical layer

  • A. Network layer
  • B. Data-link layer
  • C. Session layer

Answer: B

NEW QUESTION 2
In preparation to do a vulnerability scan against your company's systems. You've taken the steps below:
You've notified users that there will be a system test.
You've priontized and selected your targets and subnets.
You've configured the system to do a deep scan.
You have a member of your team on call to answer questions.
Which of the following is a necessary step to take prior to starting the scan?

  • A. Placing the incident response team on cal
  • B. Clear relevant system log file
  • C. Getting permission to run the sca
  • D. Scheduling the scan to run before OS update

Answer: C

NEW QUESTION 3
Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

  • A. Anonymous authentication
  • B. Mutual authentication
  • C. Open system authentication
  • D. Shared key authentication

Answer: CD

NEW QUESTION 4
You are an Intrusion Detection Analyst and the system has alerted you to an Event of Interest (EOI) that appears to be activity generated by a worm. You investigate and find that the network traffic was normal. How would this type of alert be categorized?

  • A. False Positive
  • B. True Negative
  • C. True Positive
  • D. False Negative

Answer: A

NEW QUESTION 5
What protocol is a WAN technology?

  • A. 802.11
  • B. 802.3
  • C. Ethernet
  • D. Frame Relay

Answer: D

NEW QUESTION 6
Which of the following protocols implements VPN using IPSec?

  • A. SLIP
  • B. PPP
  • C. L2TP
  • D. PPTP

Answer: C

NEW QUESTION 7
You have an automated system for patching the operating systems of all your computers. All patches are supposedly current. Yet your automated vulnerability scanner has just reported vulnerabilities that you believe have been patched. Which of the actions below should you take next?

  • A. Check some systems manuall
  • B. Rerun the system patching routine
  • C. Contact the incident response tea
  • D. Ignore the findings as false positive

Answer: A

NEW QUESTION 8
Which of the following terms refers to the process in which headers and trailers are added around user data?

  • A. Encapsulation
  • B. Authentication
  • C. Authorization
  • D. Encryption

Answer: A

NEW QUESTION 9
Which of the following radio frequencies is used by the IEEE 802.11a wireless network?

  • A. 3.7 GHz
  • B. 7.0 GHz
  • C. 2.4 GHz
  • D. 5.0 GHz

Answer: D

NEW QUESTION 10
Which common firewall feature can be utilized to generate a forensic trail of evidence and
to identify attack trends against your network?

  • A. NAT
  • B. State Table
  • C. Logging
  • D. Content filtering

Answer: C

NEW QUESTION 11
Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

  • A. Information centric defense
  • B. Uniform information protection
  • C. General information protection
  • D. Perimeter layering

Answer: A

NEW QUESTION 12
When should you create the initial database for a Linux file integrity checker?

  • A. Before a system is patched
  • B. After a system has been compromised
  • C. Before a system has been compromised
  • D. During an attack

Answer: C

NEW QUESTION 13
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

  • A. Privacy policy
  • B. Backup policy
  • C. User password policy
  • D. Network security policy

Answer: A

NEW QUESTION 14
Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

  • A. Application
  • B. System
  • C. Startup
  • D. Security

Answer: B

NEW QUESTION 15
You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

  • A. killall httpd
  • B. endall httpd
  • C. kill httpd
  • D. end httpd

Answer: A

NEW QUESTION 16
What file instructs programs like Web spiders NOT to search certain areas of a site?

  • A. Robots.txt
  • B. Restricted.txt
  • C. Spider.txt
  • D. Search.txt

Answer: A

NEW QUESTION 17
Which of the following is required to be backed up on a domain controller to recover Active Directory?

  • A. System state data
  • B. Operating System files
  • C. User's personal data
  • D. Installed third party application's folders

Answer: A

NEW QUESTION 18
Which of the following is TRUE regarding Ethernet?

  • A. Stations are not required to monitor their transmission to check for collision
  • B. Several stations are allowed to be transmitting at any given time within a single collision domai
  • C. Ethernet is shared medi
  • D. Stations are not required to listen before they transmi

Answer: C

NEW QUESTION 19
......

P.S. Allfreedumps.com now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.allfreedumps.com/GSEC-dumps.html (279 New Questions)