It is impossible to pass GIAC GSEC exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed GIAC GSEC practice questions. You will get a surprising result by our Update GIAC Security Essentials Certification practice guides.
Free GSEC Demo Online For GIAC Certifitcation:
NEW QUESTION 1
Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?
Answer: B
NEW QUESTION 2
In PKI, when someone wants to verify that the certificate is valid, what do they use to decrypt the signature?
Answer: D
NEW QUESTION 3
Which of the following is a Layer 3 device that will typically drop directed broadcast traffic?
Answer: C
NEW QUESTION 4
Which of the following is NOT a recommended best practice for securing Terminal Services and Remote Desktop?
Answer: B
NEW QUESTION 5
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Answer: C
NEW QUESTION 6
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
Answer: C
NEW QUESTION 7
Which Host-based IDS (HIDS) method of log monitoring utilizes a list of keywords or phrases that define the events of interest for the analyst, then takes a list of keywords to watch for and generates alerts when it sees matches in log file activity?
Answer: D
NEW QUESTION 8
Which of the following is an advantage of a Host Intrusion Detection System (HIDS) versus a Network Intrusion Detection System (NIDS)?
Answer: A
NEW QUESTION 9
An employee attempting to use your wireless portal reports receiving the error shown below. Which scenario is occurring?
Answer: D
NEW QUESTION 10
You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:
* they contain only numerals
* they contain only letters
* they contain only special characters
* they contain only letters and numerals
" they contain only letters and special characters
* they contain only numerals and special characters
Of the following, what is the benefit to using this set of tests?
Answer: B
NEW QUESTION 11
Which of the following is an advantage of an Intrusion Detection System?
Answer: A
NEW QUESTION 12
Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.
This style of defense-in-depth protection is best described as which of the following?
Answer: B
NEW QUESTION 13
Which of the following statements about the authentication concept of information security management is true?
Answer: D
NEW QUESTION 14
When designing wireless networks, one strategy to consider is implementing security mechanisms at all layers of the OSI model. Which of the following protection mechanisms would protect layer 1?
Answer: B
NEW QUESTION 15
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
Answer: B
NEW QUESTION 16
Which of the following statements about DMZ are true?
Each correct answer represents a complete solution. Choose two.
Answer: AC
NEW QUESTION 17
Which of the following statements about the integrity concept of information security management are true?
Each correct answer represents a complete solution. Choose three.
Answer: ACD
NEW QUESTION 18
Which of the following items are examples of preventive physical controls? Each correct answer represents a complete solution. Choose three.
Answer: ACD
NEW QUESTION 19
There are three key factors in selecting a biometric mechanism. What are they?
Answer: C
NEW QUESTION 20
You have set up a local area network for your company. Your firewall separates your network into several sections: a DMZ with semi-public servers (web, dns, email) and an intranet with private servers. A penetration tester gains access to both sections and installs sniffers in each. He is able to capture network traffic for all the devices in the private section but only for one device (the device with the sniffer) in the DMZ. What can be inferred about the design of the system?
Answer: B
NEW QUESTION 21
......
Recommend!! Get the Full GSEC dumps in VCE and PDF From Dumps-hub.com, Welcome to Download: https://www.dumps-hub.com/GSEC-dumps.html (New 279 Q&As Version)