GSEC | Approved GIAC GSEC Free Draindumps Online

Want to know Examcollection GSEC Exam practice test features? Want to lear more about GIAC GIAC Security Essentials Certification certification experience? Study Precise GIAC GSEC answers to Improved GSEC questions at Examcollection. Gat a success with an absolute guarantee to pass GIAC GSEC (GIAC Security Essentials Certification) test on your first attempt.

Free demo questions for GIAC GSEC Exam Dumps Below:

NEW QUESTION 1
Which of the following statements about IPSec are true?
Each correct answer represents a complete solution. Choose two.

  • A. It uses Internet Protocol (IP) for data integrit
  • B. It uses Authentication Header (AH) for data integrit
  • C. It uses Password Authentication Protocol (PAP) for user authenticatio
  • D. It uses Encapsulating Security Payload (ESP) for data confidentialit

Answer: BD

NEW QUESTION 2
Which of the following statements about buffer overflow is true?

  • A. It manages security credentials and public keys for message encryptio
  • B. It is a collection of files used by Microsoft for software updates released between major service pack release
  • C. It is a condition in which an application receives more data than it is configured to accep
  • D. It is a false warning about a viru

Answer: C

NEW QUESTION 3
Which of the following works at the network layer and hides the local area network IP address and topology?

  • A. Network address translation (NAT)
  • B. Hub
  • C. MAC address
  • D. Network interface card (NIC)

Answer: A

NEW QUESTION 4
What type of attack can be performed against a wireless network using the tool Kismet?

  • A. IP spoofing
  • B. Eavesdropping
  • C. Masquerading
  • D. Denial of Service

Answer: B

NEW QUESTION 5
Which of the following are examples of Issue-Specific policies all organizations should address?

  • A. Perimeter filtering guides, break times for employees, desktop neatness and backup procedure
  • B. Rogue wireless access points, auditing, break time for employees and organizational structur
  • C. Audit logs, physical access, mission statements and network protocols use
  • D. Backup requirements, employee monitoring, physical access and acceptable us

Answer: D

NEW QUESTION 6
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

  • A. TCP port 443
  • B. UDP port 161
  • C. TCP port 110
  • D. UDP port 1701

Answer: D

NEW QUESTION 7
Which of the following are the types of intrusion detection systems?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Host-based intrusion detection system (HIDS)
  • B. Client-based intrusion detection system (CIDS)
  • C. Server-based intrusion detection system (SIDS)
  • D. Network intrusion detection system (NIDS)

Answer: AD

NEW QUESTION 8
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain- based network. The network contains ten Windows 2003 member servers, 150 Windows XP Professional client computers. According to the company's security policy, Mark needs to check whether all the computers in the network have all available security updates and shared folders. He also needs to check the file system type on each computer's hard disk. Mark installs and runs MBSACLI.EXE with the appropriate switches on a server. Which of the following tasks will he accomplish?

  • A. None of the tasks will be accomplishe
  • B. He will be able to check the file system type on each computer's hard dis
  • C. He will be able to accomplish all the task
  • D. He will be able to check all available security updates and shared folder

Answer: C

NEW QUESTION 9
During a scheduled evacuation training session the following events took place in this order:
* 1. Evacuation process began by triggering the building fire alarm.
* 2a. The meeting point leader arrived first at the designated meeting point and immediately began making note of who was and was not accounted for.
* 2b. Stairwell and door monitors made it to their designated position to leave behind a box of flashlights and prop the stairway doors open with a garbage can so employees can find exits and dispose of food and beverages.
2c. Special needs assistants performed their assigned responsibility to help employees out that require special assistance.
* 3. The safety warden communicated with the meeting point leader via walkie talkie to collect a list of missing personnel and communicated this information back to the searchers.
* 4. Searchers began checking each room and placing stick-it notes on the bottom of searched doors to designate which areas were cleared.
* 5. All special need assistants and their designated wards exited the building.
* 6. Searchers complete their assigned search pattern and exit with the Stairwell/door monitors.
Given this sequence of events, which role is in violation of its expected evacuation tasks?

  • A. Safety warden
  • B. Stairwell and door monitors
  • C. Meeting point leader
  • D. Searchers
  • E. Special needs assistants

Answer: B

NEW QUESTION 10
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

  • A. Visitors
  • B. Customers
  • C. Employees
  • D. Hackers

Answer: C

NEW QUESTION 11
Which of the following SIP methods is used to setup a new session and add a caller?

  • A. ACK
  • B. BYE
  • C. REGISTER
  • D. INVITE
  • E. CANCEL

Answer: D

NEW QUESTION 12
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?

  • A. Provides end-to-end data delivery service for user applications
  • B. Handles the routing of the data packets over the network
  • C. Manages IP addressing and encryption for data packets
  • D. Defines the procedures for interfacing with Ethernet devices

Answer: D

NEW QUESTION 13
If a DNS client wants to look up the IP address for good.news.com and does not receive an authoritative reply from its local DNS server, which name server is most likely to provide an authoritative reply?

  • A. The news.com domain name server
  • B. The .com (top-level) domain name server
  • C. The .(root-level) domain name server
  • D. The .gov (top-level) domain name server

Answer: A

NEW QUESTION 14
What database can provide contact information for Internet domains?

  • A. dig
  • B. who
  • C. who is
  • D. ns look up

Answer: C

NEW QUESTION 15
When discussing access controls, which of the following terms describes the process of determining the activities or functions that an Individual is permitted to perform?

  • A. Authentication
  • B. Identification
  • C. Authorization
  • D. Validation

Answer: C

NEW QUESTION 16
What is the following sequence of packets demonstrating?

  • A. telnet.com.telnet > client.com.38060: F 4289:4289(0) ack 92 win 1024
  • B. client.com.38060 > telnet.com.telnet: .ack 4290 win 8760 (DF)
  • C. client.com.38060 > telnet.com.telnet: F 92:92(0) ack 4290 win 8760 (DF)
  • D. telnet.com.telnet > client.com.38060: .ack 93 win 1024

Answer: C

NEW QUESTION 17
Which of the following choices accurately describes how PGP works when encrypting email?

  • A. PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric ke
  • B. PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key
  • C. PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key
  • D. PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric ke

Answer: B

NEW QUESTION 18
What is the main problem with relying solely on firewalls to protect your company's sensitive data?

  • A. Their value is limited unless a full-featured Intrusion Detection System is use
  • B. Their value is limited because they cannot be changed once they are configure
  • C. Their value is limited because operating systems are now automatically patche
  • D. Their value is limited because they can be bypassed by technical and non-technical mean

Answer: D

NEW QUESTION 19
......

Recommend!! Get the Full GSEC dumps in VCE and PDF From Allfreedumps.com, Welcome to Download: https://www.allfreedumps.com/GSEC-dumps.html (New 279 Q&As Version)