GSEC Premium Bundle

GSEC Premium Bundle

GIAC Security Essentials Certification Certification Exam

4.5 
(54585 ratings)
279 QuestionsPractice Tests
279 PDFPrint version
December 4, 2024Last update

GIAC GSEC Free Practice Questions

We provide real GSEC exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass GIAC GSEC Exam quickly & easily. The GSEC PDF type is available for reading and printing. You can print more and practice many times. With the help of our GIAC GSEC dumps pdf and vce product and material, you can easily pass the GSEC exam.

GIAC GSEC Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Why would someone use port 80 for deployment of unauthorized services?

  • A. Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue servic
  • B. If someone were to randomly browse to the rogue port 80 service they could be compromise
  • C. This is a technique commonly used to perform a denial of service on the local web serve
  • D. HTTP traffic is usually allowed outbound to port 80 through the firewall in most environment

Answer: D

NEW QUESTION 2
Which of the following is a benefit to utilizing Cygwin for Windows?

  • A. The ability to install a complete Red Hat operating system Install on Window
  • B. The ability to bring much more powerful scripting capabilities to Window
  • C. The ability to run a production Apache serve
  • D. The ability to install a complete Ubuntu operating system install on Window

Answer: A

NEW QUESTION 3
When designing wireless networks, one strategy to consider is implementing security mechanisms at all layers of the OSI model. Which of the following protection mechanisms would protect layer 1?

  • A. Hardening applications
  • B. Limit RF coverage
  • C. Employing firewalls
  • D. Enabling strong encryption

Answer: B

NEW QUESTION 4
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

  • A. nice -n 19 cc -c *.c &
  • B. nice cc -c *.c &
  • C. nice -n -20 cc -c *.c &
  • D. nice cc -c *.c

Answer: C

NEW QUESTION 5
Which of the following hardware devices prevents broadcasts from crossing over subnets?

  • A. Bridge
  • B. Hub
  • C. Router
  • D. Modem

Answer: C

NEW QUESTION 6
Which of the following is a required component for successful 802.lx network authentication?

  • A. Supplicant
  • B. 3rd-party Certificate Authority
  • C. Ticket Granting Server (TGS)
  • D. IPSec

Answer: A

NEW QUESTION 7
What would the file permission example "rwsr-sr-x" translate to in absolute mode?

  • A. 1755
  • B. 6755
  • C. 6645
  • D. 1644

Answer: B

NEW QUESTION 8
Which of the following protocols implements VPN using IPSec?

  • A. SLIP
  • B. PPP
  • C. L2TP
  • D. PPTP

Answer: C

NEW QUESTION 9
Which common firewall feature can be utilized to generate a forensic trail of evidence and
to identify attack trends against your network?

  • A. NAT
  • B. State Table
  • C. Logging
  • D. Content filtering

Answer: C

NEW QUESTION 10
An IT security manager is trying to quickly assess the risks associated with not implementing a corporate firewall system. What sort of risk assessment is most appropriate?

  • A. Annualized Risk Assessment
  • B. Qualitative risk assessment
  • C. Quantitative risk assessment
  • D. Technical Risk Assessment
  • E. Iterative Risk Assessment

Answer: B

NEW QUESTION 11
Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

  • A. Application
  • B. System
  • C. Startup
  • D. Security

Answer: B

NEW QUESTION 12
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?
Each correct answer represents a complete solution. Choose two.

  • A. 80
  • B. 25
  • C. 20
  • D. 110

Answer: BD

NEW QUESTION 13
To be considered a strong algorithm, an encryption algorithm must be which of the following?

  • A. Secret
  • B. Well-known
  • C. Confidential
  • D. Proprietary

Answer: B

NEW QUESTION 14
What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

  • A. Camera Recordings
  • B. Security guards
  • C. Encryption
  • D. Shredding
  • E. Corrective Controls

Answer: C

NEW QUESTION 15
Which of the following types of computers is used for attracting potential intruders?

  • A. Files pot
  • B. Honey pot
  • C. Data pot
  • D. Bastion host

Answer: B

NEW QUESTION 16
......

Recommend!! Get the Full GSEC dumps in VCE and PDF From Certshared, Welcome to Download: https://www.certshared.com/exam/GSEC/ (New 279 Q&As Version)


START GSEC EXAM