GSEC | Free GIAC GSEC Training Materials Online

Your success in GIAC GSEC is our sole target and we develop all our GSEC braindumps in a way that facilitates the attainment of this target. Not only is our GSEC study material the best you can find, it is also the most detailed and the most updated. GSEC Practice Exams for GIAC GSEC are written to the highest standards of technical accuracy.

Free demo questions for GIAC GSEC Exam Dumps Below:

NEW QUESTION 1
Why would someone use port 80 for deployment of unauthorized services?

  • A. Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue servic
  • B. If someone were to randomly browse to the rogue port 80 service they could be compromise
  • C. This is a technique commonly used to perform a denial of service on the local web serve
  • D. HTTP traffic is usually allowed outbound to port 80 through the firewall in most environment

Answer: D

NEW QUESTION 2
What is the term for a game in which for every win there must be an equivalent loss?

  • A. Asymmetric
  • B. Untenable
  • C. Zero-sum
  • D. Gain-oriented

Answer: C

NEW QUESTION 3
How are differences in configuration settings handled between Domain and Local Group Policy Objects (GPOs)?

  • A. Local and Domain GPOs control different configuration settings, so there will not be conflict
  • B. Settings in the domain-wide GPO override conflicting settings in the local GPO on each compute
  • C. Settings in the local GPO override conflicting settings when the domain-wide GPO is applie
  • D. Precedence depends on which GPO was updated firs

Answer: B

NEW QUESTION 4
You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).
You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

  • A. Copy the files to a network share on an NTFS volum
  • B. Copy the files to a network share on a FAT32 volum
  • C. Place the files in an encrypted folde
  • D. Then, copy the folder to a floppy dis
  • E. Copy the files to a floppy disk that has been formatted using Windows 2000 Professiona

Answer: A

NEW QUESTION 5
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?

  • A. The packets are probably corrupte
  • B. The packets may have been accidentally routed onto the Interne
  • C. The packets may be deliberately spoofed by an attacke
  • D. The packets are a sign of excess fragmentatio
  • E. A and B
  • F. B and C
  • G. B and D
  • H. A and D

Answer: B

NEW QUESTION 6
An employee is currently logged into the corporate web server, without permission. You log into the web server as 'admin" and look for the employee's username: "dmaul" using the "who" command. This is what you get back:
GSEC dumps exhibit

  • A. The contents of the /var/log/messages file has been altered
  • B. The contents of the bash history file has been altered
  • C. The contents of the utmp file has been altered
  • D. The contents of the http logs have been altered

Answer: B

NEW QUESTION 7
Which of the following is a Layer 3 device that will typically drop directed broadcast traffic?

  • A. Hubs
  • B. Bridges
  • C. Routers
  • D. Switches

Answer: C

NEW QUESTION 8
Many IIS servers connect to Microsoft SQL databases. Which of the following statements about SQL server security is TRUE?

  • A. SQL Server patches are part of the operating system patche
  • B. SQL Server should be installed on the same box as your IIS web server when they communicate as part of the web applicatio
  • C. It is good practice to never use integrated Windows authentication for SQL Serve
  • D. It is good practice to not allow users to send raw SQL commands to the SQL Serve

Answer: D

NEW QUESTION 9
You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

  • A. NETSTAT -s
  • B. NBTSTAT -s
  • C. NBTSTAT -n
  • D. NETSTAT -n

Answer: C

NEW QUESTION 10
What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

  • A. These attacks work against relatively idle server
  • B. These attacks rely on a modified TCP/IP stack to functio
  • C. These attacks can be easily traced back to the sourc
  • D. These attacks only work against Linux/Unix host

Answer: A

NEW QUESTION 11
Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

  • A. The server is not using a well-known por
  • B. The server is on a different networ
  • C. The client-side source ports are differen
  • D. The clients are on different subnet

Answer: C

NEW QUESTION 12
Which of the following is an Implementation of PKI?

  • A. SSL
  • B. 3DES
  • C. Kerberos
  • D. SHA-1

Answer: A

NEW QUESTION 13
What is the key difference between Electronic Codebook mode and other block cipher modes like Cipher Block Chaining, Cipher-Feedback and Output-Feedback?

  • A. Plaintext patterns are concealed by XO Ring with previous cipher text block but input to the block cipher is not randomize
  • B. Plaintext patterns are concealed and input to the block cipher is randomized by XO Ring with previous cipher text bloc
  • C. Plaintext patterns encrypted with the same key will always generate the same Cipher text pattern
  • D. Plaintext patterns are not concealed but input to the block cipher is randomized by XO Ring with previous cipher text bloc

Answer: C

NEW QUESTION 14
Which of the following is generally practiced by the police or any other recognized governmental authority?

  • A. Spoofing
  • B. SMB signing
  • C. Wiretapping
  • D. Phishing

Answer: C

NEW QUESTION 15
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

  • A. Take a full backup daily with the previous night's tape taken offsit
  • B. Take a full backup daily and use six-tape rotatio
  • C. Take a full backup on Monday and an incremental backup on each of the following weekday
  • D. Keep Monday's backup offsit
  • E. Take a full backup on alternate days and keep rotating the tape
  • F. Take a full backup on Monday and a differential backup on each of the following weekday
  • G. Keep Monday's backup offsit
  • H. Take a full backup daily with one tape taken offsite weekl

Answer: A

NEW QUESTION 16
There are three key factors in selecting a biometric mechanism. What are they?

  • A. Reliability, encryption strength, and cost
  • B. Encryption strength, authorization method, and cost
  • C. Reliability, user acceptance, and cost
  • D. User acceptance, encryption strength, and cost

Answer: C

NEW QUESTION 17
Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?

  • A. NSLOOKUP
  • B. IPCONFIG
  • C. ARP
  • D. IFCONFIG

Answer: D

NEW QUESTION 18
Which of the following statements about Microsoft's VPN client software is FALSE?

  • A. The VPN interface can be figured into the route tabl
  • B. The VPN interface has the same IP address as the interface to the network it's been specified to protec
  • C. The VPN client software is built into the Windows operating syste
  • D. The VPN tunnel appears as simply another adapte

Answer: B

NEW QUESTION 19
......

Recommend!! Get the Full GSEC dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GSEC-exam-dumps.html (New 279 Q&As Version)