GSEC Exam - GIAC Security Essentials Certification

certleader.com

Pass4sure GSEC Questions are updated and all GSEC answers are verified by experts. Once you have completely prepared with our GSEC exam prep kits you will be ready for the real GSEC exam without a problem. We have Improve GIAC GSEC dumps study guide. PASSED GSEC First attempt! Here What I Did.

GIAC GSEC Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following works at the network layer and hides the local area network IP address and topology?

  • A. Network address translation (NAT)
  • B. Hub
  • C. MAC address
  • D. Network interface card (NIC)

Answer: A

NEW QUESTION 2
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

  • A. 443
  • B. 22
  • C. 21
  • D. 80

Answer: B

NEW QUESTION 3
Where are user accounts and passwords stored in a decentralized privilege management environment?

  • A. On a central authentication serve
  • B. On more than one serve
  • C. On each serve
  • D. On a server configured for decentralized privilege managemen

Answer: C

NEW QUESTION 4
Which Linux file lists every process that starts at boot time?

  • A. inetd
  • B. netsrv
  • C. initd
  • D. inittab

Answer: D

NEW QUESTION 5
Why are false positives such a problem with IPS technology?

  • A. File integrity is not guarantee
  • B. Malicious code can get into the networ
  • C. Legitimate services are not delivere
  • D. Rules are often misinterprete

Answer: D

NEW QUESTION 6
To be considered a strong algorithm, an encryption algorithm must be which of the following?

  • A. Secret
  • B. Well-known
  • C. Confidential
  • D. Proprietary

Answer: B

NEW QUESTION 7
The Linux command to make the /etc/shadow file, already owned by root, readable only by root is which of the following?

  • A. chmod 444/etc/shadow
  • B. chown root: root/etc/shadow
  • C. chmod 400/etc/shadow
  • D. chown 400 /etc/shadow

Answer: C

NEW QUESTION 8
The process of enumerating all hosts on a network defines which of the following activities?

  • A. Port scanning
  • B. Vulnerability scanning
  • C. GPS mapping
  • D. Network mapping

Answer: D

NEW QUESTION 9
A folder D:\Files\Marketing has the following NTFS permissions:
. Administrators: Full Control
. Marketing: Change and Authenticated
. Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
. Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

  • A. No access
  • B. Full Control
  • C. Read
  • D. Change

Answer: C

NEW QUESTION 10
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

  • A. Take a full backup daily with the previous night's tape taken offsit
  • B. Take a full backup daily and use six-tape rotatio
  • C. Take a full backup on Monday and an incremental backup on each of the following weekday
  • D. Keep Monday's backup offsit
  • E. Take a full backup on alternate days and keep rotating the tape
  • F. Take a full backup on Monday and a differential backup on each of the following weekday
  • G. Keep Monday's backup offsit
  • H. Take a full backup daily with one tape taken offsite weekl

Answer: A

NEW QUESTION 11
What database can provide contact information for Internet domains?

  • A. dig
  • B. who
  • C. who is
  • D. ns look up

Answer: C

NEW QUESTION 12
For most organizations, which of the following should be the highest priority when it comes to physical security concerns?

  • A. Controlling ingress and egress
  • B. Controlling access to workstations
  • C. Ensuring employee safety
  • D. Controlling access to servers
  • E. Protecting physical assets

Answer: C

NEW QUESTION 13
Which of the following is an advantage of an Intrusion Detection System?

  • A. It is a mature technolog
  • B. It is the best network securit
  • C. It never needs patchin
  • D. It is a firewall replacemen

Answer: A

NEW QUESTION 14
Which of the following is used to allow or deny access to network resources?

  • A. Spoofing
  • B. ACL
  • C. System hardening
  • D. NFS

Answer: B

NEW QUESTION 15
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

  • A. Hardening
  • B. Authentication
  • C. Cryptography
  • D. Sanitization

Answer: A

NEW QUESTION 16
Which of the following tools is also capable of static packet filtering?

  • A. netstat.exe
  • B. ipsecpol.exe
  • C. ipconfig.exe
  • D. net.exe

Answer: B

NEW QUESTION 17
Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

  • A. The server is not using a well-known por
  • B. The server is on a different networ
  • C. The client-side source ports are differen
  • D. The clients are on different subnet

Answer: C

NEW QUESTION 18
Which of the following radio frequencies is used by the IEEE 802.11a wireless network?

  • A. 3.7 GHz
  • B. 7.0 GHz
  • C. 2.4 GHz
  • D. 5.0 GHz

Answer: D

NEW QUESTION 19
Which of the following types of computers is used for attracting potential intruders?

  • A. Files pot
  • B. Honey pot
  • C. Data pot
  • D. Bastion host

Answer: B

NEW QUESTION 20
Which of the following proxy servers provides administrative controls over the content?

  • A. Content filtering web proxy server
  • B. Caching proxy server
  • C. Forced proxy server
  • D. Web proxy server

Answer: A

NEW QUESTION 21
......

P.S. Certleader now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.certleader.com/GSEC-dumps.html (279 New Questions)