Practice with GSEC Dumps for GIAC Information Security Certified Exam Questions & Answer [Q38-Q62]

0 Comments

Rate this post

Practice with GSEC Dumps for GIAC Information Security Certified Exam Questions & Answer

REAL GSEC Exam Questions With 100% Refund Guarantee

QUESTION 38
When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP’s cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

 
 
 
 

QUESTION 39
Which of the following books deals with confidentiality?

 
 
 
 

QUESTION 40
Which of the following commands generates or assigns a random password to a user account in a Linux computer?

 
 
 
 

QUESTION 41
If a DNS client wants to look up the IP address for good.news.com and does not receive an authoritative reply from its local DNS server, which name server is most likely to provide an authoritative reply?

 
 
 
 

QUESTION 42
IPS devices that are classified as “In-line NIDS” devices use a combination of anomaly analysis, signature-based rules, and what else to identify malicious events on the network?

 
 
 
 

QUESTION 43
You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company’s business systems?

 
 
 
 

QUESTION 44
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.
John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

 
 
 
 

QUESTION 45
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser’s address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.uCertify.com. What is the most likely cause?

 
 
 
 

QUESTION 46
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 47
Which of the following files is used to control the behavior of the SSH server?

 
 
 
 

QUESTION 48
Which of the following statements about the authentication concept of information security management is true?

 
 
 
 

QUESTION 49
Which of the following books of the Rainbow Series contains the DOD Password Management Guidelines?

 
 
 
 

QUESTION 50
Adam works as a System Administrator for Umbrella Inc. The company has a Windows Server 2003 domain-based network. All client computers on the network run Windows 7 Ultimate. Andy, the manager of the sales department complains to Adam that he is not able to install accounting software on his computer. Adam checks the compatibility of the software with Windows 7, and all of the minimum requirements for running the software are met. He then checks for any domain or organizational policies, which are restricting the software to be installed. He finds out that none of the above is restricting the software to be installed. Adam suspects that the security policy of the local machine is affecting the installation. Adam wants to change the software access rights of Andy, so that it is determined by the access rights of the user. Which of the following Software restriction policies is used to accomplish the task?

 
 
 
 

QUESTION 51
Which layer of the TCP/IP Protocol Stack Is responsible for port numbers?

 
 
 
 

QUESTION 52
Which of the following tools is also capable of static packet filtering?

 
 
 
 

QUESTION 53
Which of the following is NOT typically used to mitigate the war dialing threat?

 
 
 
 

QUESTION 54
You are responsible for the wireless network of your company. You have been asked to create SSID’s for wireless routers. What are the limits on an SSID?
Each correct answer represents a complete solution. Choose two.

 
 
 
 
 

QUESTION 55
You are going to upgrade your hard disk’s file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 56
Which of the following is a characteristic of hash operations?

 
 
 
 

QUESTION 57
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring an application server. An application named Report, which is owned by the root user, is placed on the server. This application requires superuser permission to write to other files. All sales managers of the company will be using the application. Which of the following steps will you take in order to enable the sales managers to run and use the Report application?

 
 
 
 

QUESTION 58
Rick works as a Network Administrator. He is configuring the systems for maximum security. Before using the security template, he wants to edit it to change some of the security settings that are not required for now. Which of the following tools will he choose, to edit the security template?

 
 
 
 

QUESTION 59
Which of the following commands is used to switch from one user login to another in a Linux computer?

 
 
 
 

QUESTION 60
Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.
This style of defense-in-depth protection is best described as which of the following?

 
 
 
 

QUESTION 61
Which of the following statements would be seen in a Disaster Recovery Plan?

 
 
 
 

QUESTION 62
Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

 
 
 
 

PDF Download GIAC Test To Gain Brilliante Result!: https://www.vcedumps.com/GSEC-examcollection.html


Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below