GSEC Premium Bundle

GSEC Premium Bundle

GIAC Security Essentials Certification Certification Exam

4.5 
(54540 ratings)
279 QuestionsPractice Tests
279 PDFPrint version
September 29, 2024Last update

GIAC GSEC Free Practice Questions

Master the GSEC GIAC Security Essentials Certification content and be ready for exam day success quickly with this Pass4sure GSEC braindumps. We guarantee it!We make it a reality and give you real GSEC questions in our GIAC GSEC braindumps.Latest 100% VALID GIAC GSEC Exam Questions Dumps at below page. You can use our GIAC GSEC braindumps and pass your exam.

Free demo questions for GIAC GSEC Exam Dumps Below:

NEW QUESTION 1
Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode?

  • A. Length
  • B. Source IP
  • C. TTL
  • D. Destination IP

Answer: C

NEW QUESTION 2
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company. You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout?
Each correct answer represents a complete solution. Choose all that apply.

  • A. To collect data from operating system logs
  • B. To notify the console with an alert if any intrusion is detected
  • C. To analyze for known signatures
  • D. To collect data from Web servers

Answer: BC

NEW QUESTION 3
Which of the following is a backup strategy?

  • A. Differential
  • B. Integrational
  • C. Recursive
  • D. Supplemental

Answer: A

NEW QUESTION 4
Which of the following is required to be backed up on a domain controller to recover Active Directory?

  • A. System state data
  • B. Operating System files
  • C. User's personal data
  • D. Installed third party application's folders

Answer: A

NEW QUESTION 5
Which class of IDS events occur when the IDS fails to alert on malicious data?

  • A. True Negative
  • B. True Positive
  • C. False Positive
  • D. False Negative

Answer: D

NEW QUESTION 6
Which of the following is an advantage of an Intrusion Detection System?

  • A. It is a mature technolog
  • B. It is the best network securit
  • C. It never needs patchin
  • D. It is a firewall replacemen

Answer: A

NEW QUESTION 7
Which of the following is a characteristic of hash operations?

  • A. Asymmetric
  • B. Non-reversible
  • C. Symmetric
  • D. Variable length output

Answer: D

NEW QUESTION 8
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

  • A. RARP
  • B. ARP
  • C. DNS
  • D. RDNS

Answer: A

NEW QUESTION 9
What is the maximum passphrase length in Windows 2000/XP/2003?

  • A. 255 characters
  • B. 127 characters
  • C. 95 characters
  • D. 63 characters

Answer: B

NEW QUESTION 10
What is TRUE about Workgroups and Domain Controllers?

  • A. By default all computers running Windows 2008 can only form Domain Controllers not Workgroups
  • B. Workgroups are characterized by higher costs while Domain Controllers by lower costs
  • C. You cannot have stand-alone computers in the midst of other machines that are members of a domain
  • D. Workgroup computers cannot share resources, only computers running on the same domain can
  • E. You can have stand-alone computers in the midst of other machines that are members of a domai

Answer: E

NEW QUESTION 11
What is the discipline of establishing a known baseline and managing that condition known as?

  • A. Condition deployment
  • B. Observation discipline
  • C. Security establishment
  • D. Configuration management

Answer: C

NEW QUESTION 12
One of your Linux systems was compromised last night. According to change management history and a recent vulnerability scan, the system's patches were up-to-date at the time of the attack. Which of the following statements is the Most Likely explanation?

  • A. It was a zero-day exploi
  • B. It was a Trojan Horse exploi
  • C. It was a worm exploi
  • D. It was a man-in-middle exploi

Answer: A

NEW QUESTION 13
In order to capture traffic for analysis, Network Intrusion Detection Systems (NIDS) operate with network cards in what mode?

  • A. Discrete
  • B. Reporting
  • C. Promiscuous
  • D. Alert

Answer: C

NEW QUESTION 14
Your CIO has found out that it is possible for an attacker to clone your company's RFID (Radio Frequency ID) based key cards. The CIO has tasked you with finding a way to ensure that anyone entering the building is an employee. Which of the following authentication types would be the appropriate solution to this problem?

  • A. Mandatory Access Controls
  • B. Bell-LaPadula
  • C. Two-Factor
  • D. TACACS

Answer: C

NEW QUESTION 15
SSL session keys are available in which of the following lengths?

  • A. 40-bit and 128-bi
  • B. 64-bit and 128-bi
  • C. 128-bit and 1,024-bi
  • D. 40-bit and 64-bi

Answer: A

NEW QUESTION 16
......

100% Valid and Newest Version GSEC Questions & Answers shared by Dumps-hub.com, Get Full Dumps HERE: https://www.dumps-hub.com/GSEC-dumps.html (New 279 Q&As)


START GSEC EXAM