The Secret Of GIAC GSEC Exam Dumps

Exam Code: GSEC (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Security Essentials Certification
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GSEC Exam.

GIAC GSEC Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following are network connectivity devices?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Network analyzer
  • B. Bridge
  • C. Brouter
  • D. Firewall
  • E. Repeater
  • F. Hub

Answer: BCEF

NEW QUESTION 2
Which of the following statements would describe the term "incident" when used in the branch of security known as Incident Handling?

  • A. Any observable network event
  • B. Harm to systems
  • C. Significant threat of harm to systems
  • D. A and C
  • E. A, B, and C
  • F. B and C
  • G. A and B

Answer: D

NEW QUESTION 3
You have reason to believe someone with a domain user account has been accessing and modifying sensitive spreadsheets on one of your application servers. You decide to enable auditing for the files to see who is accessing and changing them. You enable the Audit Object Access policy on the files via Group Policy. Two weeks later, when you check on
the audit logs, you see they are empty. What is the most likely reason this has happened?

  • A. You cannot enable auditing on files, just folders
  • B. You did not enable auditing on the files
  • C. The person modifying the files turned off auditing
  • D. You did not save the change to the policy

Answer: B

NEW QUESTION 4
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to delete his private.txt file from his operating system. He knows that the deleted file can be recovered easily. Hence, he wants to delete the file securely. He wants to hide the shredding, and so he desires to add a final overwrite of the file private.txt with zero. Which of the following commands will John use to accomplish his task?

  • A. rmdir -v private.txt
  • B. shred -vfu private.txt
  • C. shred -vfuz private.txt
  • D. rm -vf private.txt

Answer: C

NEW QUESTION 5
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?

  • A. mv $shell
  • B. echo $shell
  • C. rm $shell
  • D. ls $shell

Answer: B

NEW QUESTION 6
Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

  • A. Anonymous authentication
  • B. Mutual authentication
  • C. Open system authentication
  • D. Shared key authentication

Answer: CD

NEW QUESTION 7
What would the file permission example "rwsr-sr-x" translate to in absolute mode?

  • A. 1755
  • B. 6755
  • C. 6645
  • D. 1644

Answer: B

NEW QUESTION 8
You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?

  • A. WPA
  • B. TKIP
  • C. WEP
  • D. WPA 2

Answer: D

NEW QUESTION 9
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are required to search for the error messages in the /var/log/messages log file. Which of the following commands will you use to accomplish this?

  • A. ps /var/log/messages
  • B. cat /var/log/messages | look error
  • C. cat /var/log/messages | grep error
  • D. cat /var/log/messages

Answer: C

NEW QUESTION 10
Which of the following is a signature-based intrusion detection system (IDS) ?

  • A. RealSecure
  • B. Snort
  • C. StealthWatch
  • D. Tripwire

Answer: B

NEW QUESTION 11
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?

  • A. The packets are probably corrupte
  • B. The packets may have been accidentally routed onto the Interne
  • C. The packets may be deliberately spoofed by an attacke
  • D. The packets are a sign of excess fragmentatio
  • E. A and B
  • F. B and C
  • G. B and D
  • H. A and D

Answer: B

NEW QUESTION 12
Which of the following features of Windows 7 allows an administrator to both passively review installed software and configure policies to prevent out-of-date or insecure software from running?

  • A. Direct Access
  • B. Software Restriction Policies
  • C. App Locker
  • D. User Account Control

Answer: C

NEW QUESTION 13
Which of the following systems acts as a NAT device when utilizing VMware in NAT mode?

  • A. Guest system
  • B. Local gateway
  • C. Host system
  • D. Virtual system

Answer: D

NEW QUESTION 14
Which of the following is a backup strategy?

  • A. Differential
  • B. Integrational
  • C. Recursive
  • D. Supplemental

Answer: A

NEW QUESTION 15
You have implemented a firewall on the company's network for blocking unauthorized network connections. Which of the following types of security control is implemented in this case?

  • A. Detective
  • B. Preventive
  • C. Directive
  • D. Corrective

Answer: B

NEW QUESTION 16
Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?

  • A. Anomaly detection
  • B. Vulnerability scanning
  • C. Perimeter assessment
  • D. Penetration testing

Answer: B

NEW QUESTION 17
......

Recommend!! Get the Full GSEC dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GSEC-exam-dumps.html (New 279 Q&As Version)