GSEC Exam Questions - Online Test


GSEC Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Want to know Examcollection GSEC Exam practice test features? Want to lear more about GIAC GIAC Security Essentials Certification certification experience? Study Real GIAC GSEC answers to Leading GSEC questions at Examcollection. Gat a success with an absolute guarantee to pass GIAC GSEC (GIAC Security Essentials Certification) test on your first attempt.

Online GIAC GSEC free dumps demo Below:

NEW QUESTION 1
You have reason to believe someone with a domain user account has been accessing and modifying sensitive spreadsheets on one of your application servers. You decide to enable auditing for the files to see who is accessing and changing them. You enable the Audit Object Access policy on the files via Group Policy. Two weeks later, when you check on
the audit logs, you see they are empty. What is the most likely reason this has happened?

  • A. You cannot enable auditing on files, just folders
  • B. You did not enable auditing on the files
  • C. The person modifying the files turned off auditing
  • D. You did not save the change to the policy

Answer: B

NEW QUESTION 2
Which class of IDS events occur when the IDS fails to alert on malicious data?

  • A. True Negative
  • B. True Positive
  • C. False Positive
  • D. False Negative

Answer: D

NEW QUESTION 3
You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?

  • A. The password of the root user cannot be change
  • B. Use the PASSWD root comman
  • C. Reboot the compute
  • D. Reboot the computer in run level 0. Use INIT=/bin/sh as a boot optio
  • E. At the bash# prompt, run the PASSWD root comman
  • F. Reboot the computer in run level 1. Use INIT=/bin/sh as a boot optio
  • G. At the bash# prompt, run the PASSWD root comman

Answer: D

NEW QUESTION 4
While building multiple virtual machines on a single host operating system, you have determined that each virtual machine needs to work on the network as a separate entity with its own unique IP address on the same logical subnet. You also need to limit each guest operating system to how much system resources it has access to. Which of the following correctly identifies steps that must be taken towards setting up these virtual environments?

  • A. The virtual machine software must define a separate virtual network Interface to each virtual machine and then define which unique logical hard drive partition should be available to the guest operating syste
  • B. The virtual machine software must define a separate virtual network interface since each system needs to have an IP address on the same logical subnet requiring they use the same physical interface on the host operating syste
  • C. The virtual machine software must define a separate virtual network interface to each virtual machine as well as how much RAM should be available to each virtual machin
  • D. The virtual machine software establishes the existence of the guest operating systems and the physical system resources to be used by that system will be configured from within the guest operating syste
  • E. The virtual machine software must define a separate physical network interface to each virtual machine so that the guest operating systems can have unique IP addresses and then define how much of the systems RAM is available to the guest operating syste

Answer: E

NEW QUESTION 5
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

  • A. RARP
  • B. ARP
  • C. DNS
  • D. RDNS

Answer: A

NEW QUESTION 6
Which command would allow an administrator to determine if a RPM package was already installed?

  • A. rpm -s
  • B. rpm -q
  • C. rpm -a
  • D. rpm -t

Answer: B

NEW QUESTION 7
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

  • A. PPTP
  • B. IPSec
  • C. PGP
  • D. NTFS

Answer: C

NEW QUESTION 8
Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.

  • A. Physical
  • B. Administrative
  • C. Automatic
  • D. Technical

Answer: ABD

NEW QUESTION 9
Which of the following statements about Microsoft's VPN client software is FALSE?

  • A. The VPN interface can be figured into the route tabl
  • B. The VPN interface has the same IP address as the interface to the network it's been specified to protec
  • C. The VPN client software is built into the Windows operating syste
  • D. The VPN tunnel appears as simply another adapte

Answer: B

NEW QUESTION 10
The following three steps belong to the chain of custody for federal rules of evidence. What additional step is recommended between steps 2 and 3?
STEP 1 - Take notes: who, what, where, when and record serial numbers of machine(s) in question.
STEP 2 - Do a binary backup if data is being collected.
STEP 3 - Deliver collected evidence to law enforcement officials.

  • A. Rebuild the original hard drive from scratch, and sign and seal the good backup in a plastic ba
  • B. Conduct a forensic analysis of all evidence collected BEFORE starting the chain of custod
  • C. Take photographs of all persons who have had access to the compute
  • D. Check the backup integrity using a checksum utility like MD5, and sign and seal each piece of collected evidence in a plastic ba

Answer: D

NEW QUESTION 11
What is the process of simultaneously installing an operating system and a Service Pack called?

  • A. Synchronous Update
  • B. Slipstreaming
  • C. Simultaneous Update
  • D. Synchronizing

Answer: B

NEW QUESTION 12
Which of the following works at the network layer and hides the local area network IP address and topology?

  • A. Network address translation (NAT)
  • B. Hub
  • C. MAC address
  • D. Network interface card (NIC)

Answer: A

NEW QUESTION 13
On which of the following OSI model layers does IPSec operate? A. Physical layer

  • A. Network layer
  • B. Data-link layer
  • C. Session layer

Answer: B

NEW QUESTION 14
With regard to defense-in-depth, which of the following statements about network design principles is correct?

  • A. A secure network design requires that systems that have access to the Internet should not be accessible from the Internet and that systems accessible from the Internet should not have access to the Interne
  • B. A secure network design requires that networks utilize VLAN (Virtual LAN) implementations to insure that private and semi-public systems are unable to reach each other without going through a firewal
  • C. A secure network design will seek to provide an effective administrative structure by providing a single choke-point for the network from which all security controls and restrictions will be enforce
  • D. A secure network design will seek to separate resources by providing a security boundary between systems that have different network security requirement

Answer: D

NEW QUESTION 15
Analyze the screenshot below. What is the purpose of this message?
GSEC dumps exhibit

  • A. To gather non-specific vulnerability information
  • B. To get the user to download malicious software
  • C. To test the browser plugins for compatibility
  • D. To alert the user to infected software on the compute

Answer: D

NEW QUESTION 16
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?

  • A. Provides end-to-end data delivery service for user applications
  • B. Handles the routing of the data packets over the network
  • C. Manages IP addressing and encryption for data packets
  • D. Defines the procedures for interfacing with Ethernet devices

Answer: D

NEW QUESTION 17
To be considered a strong algorithm, an encryption algorithm must be which of the following?

  • A. Secret
  • B. Well-known
  • C. Confidential
  • D. Proprietary

Answer: B

NEW QUESTION 18
Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?

  • A. Analysis of encrypted traffic
  • B. Provide insight into network traffic
  • C. Detection of network operations problems
  • D. Provide logs of network traffic that can be used as part of other security measure
  • E. Inexpensive to manage
  • F. B, C, and D
  • G. A, C, and E
  • H. B, D, and E
  • I. A, B, and C

Answer: C

NEW QUESTION 19
You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?
Each correct answer represents a complete solution. Choose all that apply.

  • A. NTFS gives better file security than FAT16 and FAT32.
  • B. Automatic backu
  • C. NTFS file system supports for larger hard disk
  • D. NTFS give improved disk compression than FAT16 and FAT32.

Answer: ACD

NEW QUESTION 20
Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

  • A. Both volumes should be converted to NTFS at install tim
  • B. First volume should be FAT32 and second volume should be NTF
  • C. First volume should be EFS and second volume should be FAT32.
  • D. Both volumes should be converted to FAT32 with NTFS DACL

Answer: A

NEW QUESTION 21
......

P.S. Certleader now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.certleader.com/GSEC-dumps.html (279 New Questions)