GSEC Premium Bundle

GSEC Premium Bundle

GIAC Security Essentials Certification Certification Exam

4.5 
(54555 ratings)
279 QuestionsPractice Tests
279 PDFPrint version
December 4, 2024Last update

GIAC GSEC Free Practice Questions

Act now and download your GIAC GSEC test today! Do not waste time for the worthless GIAC GSEC tutorials. Download Leading GIAC GIAC Security Essentials Certification exam with real questions and answers and begin to learn GIAC GSEC with a classic professional.

Online GIAC GSEC free dumps demo Below:

NEW QUESTION 1
Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

  • A. NBTSTAT
  • B. NSLOOKUP
  • C. PING
  • D. NETSTAT

Answer: B

NEW QUESTION 2
Which of the following statements would be seen in a Disaster Recovery Plan?

  • A. "Instructions for notification of the media can be found in Appendix A"
  • B. "The Emergency Response Plan should be executed in the case of any physical disaster listed on page 3."
  • C. "The target for restoration of business operations is 72 hours from the declaration of disaster."
  • D. "After arriving at the alternate site, utilize the server build checklist to rebuild all servers on the server rebuild list."

Answer: D

NEW QUESTION 3
Which of the following should be implemented to protect an organization from spam?

  • A. Auditing
  • B. System hardening
  • C. E-mail filtering
  • D. Packet filtering

Answer: C

NEW QUESTION 4
What is the first thing that should be done during the containment step of incident handling?

  • A. Change all the passwords
  • B. Secure the area
  • C. Prepare the Jump bag
  • D. Notify management
  • E. Prepare a report

Answer: B

NEW QUESTION 5
Which of the following protocols work at the Session layer of the OSI model? Each correct
answer represents a complete solution. Choose all that apply.

  • A. Border Gateway Multicast Protocol (BGMP)
  • B. Internet Security Association and Key Management Protocol (ISAKMP)
  • C. Trivial File Transfer Protocol (TFTP)
  • D. User Datagram Protocol (UDP)

Answer: AB

NEW QUESTION 6
CORRECT TEXT
Fill in the blank with the correct answer to complete the statement below.
The permission is the minimum required permission that is necessary for a user to enter a directory and list its contents.

  • A.

Answer: Read

NEW QUESTION 7
Which of the following is a Layer 3 device that will typically drop directed broadcast traffic?

  • A. Hubs
  • B. Bridges
  • C. Routers
  • D. Switches

Answer: C

NEW QUESTION 8
It is possible to sniff traffic from other hosts on a switched Ethernet network by impersonating which type of network device?

  • A. Switch
  • B. Bridge
  • C. Hub
  • D. Router

Answer: D

NEW QUESTION 9
Which of the following is the FIRST step in performing an Operational Security (OP5EC) Vulnerabilities Assessment?

  • A. Assess the threat
  • B. Assess vulnerabilities of critical information to the threat
  • C. Conduct risk versus benefit analysis
  • D. Implement appropriate countermeasures
  • E. Identification of critical information

Answer: E

NEW QUESTION 10
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are required to search for the error messages in the /var/log/messages log file. Which of the following commands will you use to accomplish this?

  • A. ps /var/log/messages
  • B. cat /var/log/messages | look error
  • C. cat /var/log/messages | grep error
  • D. cat /var/log/messages

Answer: C

NEW QUESTION 11
The Linux command to make the /etc/shadow file, already owned by root, readable only by root is which of the following?

  • A. chmod 444/etc/shadow
  • B. chown root: root/etc/shadow
  • C. chmod 400/etc/shadow
  • D. chown 400 /etc/shadow

Answer: C

NEW QUESTION 12
In a /24 subnet, which of the following is a valid broadcast address?

  • A. 200.11.11.1
  • B. 221.10.10.10
  • C. 245.20.30.254
  • D. 192.10.10.255

Answer: D

NEW QUESTION 13
Which of the following is TRUE regarding Ethernet?

  • A. Stations are not required to monitor their transmission to check for collision
  • B. Several stations are allowed to be transmitting at any given time within a single collision domai
  • C. Ethernet is shared medi
  • D. Stations are not required to listen before they transmi

Answer: C

NEW QUESTION 14
The Windows 'tracert' begins by sending what type of packet to the destination host?

  • A. A UDP packet with a TTL of 1
  • B. An ICMP Echo Request
  • C. An ICMP Router Discovery
  • D. An ICMP Echo Reply

Answer: A

NEW QUESTION 15
You work as an Administrator for McRoberts Inc. The company has a Linux-based network. You are logged in as a non-root user on your client computer. You want to delete all files from the /garbage directory. You want that the command you will use should prompt for the root user password. Which of the following commands will you use to accomplish the task?

  • A. rm -rf /garbage*
  • B. del /garbage/*.*
  • C. rm -rf /garbage* /SU
  • D. su -c "RM -rf /garbage*"

Answer: D

NEW QUESTION 16
......

P.S. Easily pass GSEC Exam with 279 Q&As Thedumpscentre.com Dumps & pdf Version, Welcome to Download the Newest Thedumpscentre.com GSEC Dumps: https://www.thedumpscentre.com/GSEC-dumps/ (279 New Questions)


START GSEC EXAM