aiotestking uk

GSEC Exam Questions - Online Test


GSEC Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

It is more faster and easier to pass the GIAC GSEC exam by using Realistic GIAC GIAC Security Essentials Certification questuins and answers. Immediate access to the Renovate GSEC Exam and find the same core area GSEC questions with professionally verified answers, then PASS your exam with a high score now.

Online GSEC free questions and answers of New Version:

NEW QUESTION 1
Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

  • A. NBTSTAT
  • B. NSLOOKUP
  • C. PING
  • D. NETSTAT

Answer: B

NEW QUESTION 2
Which of the following is an UDP based protocol?

  • A. telnet
  • B. SNMP
  • C. IMAP
  • D. LDAP

Answer: B

NEW QUESTION 3
Where are user accounts and passwords stored in a decentralized privilege management environment?

  • A. On a central authentication serve
  • B. On more than one serve
  • C. On each serve
  • D. On a server configured for decentralized privilege managemen

Answer: C

NEW QUESTION 4
What does the "x" character in the second field of the user account record of the /etc/passwd file indicate?

  • A. The user account is using a shadow passwor
  • B. The user account is shared by more than one use
  • C. The user account is disable
  • D. The user account does not exis

Answer: A

NEW QUESTION 5
What protocol is a WAN technology?

  • A. 802.11
  • B. 802.3
  • C. Ethernet
  • D. Frame Relay

Answer: D

NEW QUESTION 6
Which of the following areas of a network contains DNS servers and Web servers for Internet users?

  • A. VPN
  • B. MMZ
  • C. VLAN
  • D. DMZ

Answer: D

NEW QUESTION 7
Which of the following statements about buffer overflow is true?

  • A. It manages security credentials and public keys for message encryptio
  • B. It is a collection of files used by Microsoft for software updates released between major service pack release
  • C. It is a condition in which an application receives more data than it is configured to accep
  • D. It is a false warning about a viru

Answer: C

NEW QUESTION 8
Which of the following is required to be backed up on a domain controller to recover Active Directory?

  • A. System state data
  • B. Operating System files
  • C. User's personal data
  • D. Installed third party application's folders

Answer: A

NEW QUESTION 9
Which type of risk assessment results are typically categorized as low, medium, or high-risk events?

  • A. Technical
  • B. Qualitative
  • C. Management
  • D. Quantitative

Answer: B

NEW QUESTION 10
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to delete his private.txt file from his operating system. He knows that the deleted file can be recovered easily. Hence, he wants to delete the file securely. He wants to hide the shredding, and so he desires to add a final overwrite of the file private.txt with zero. Which of the following commands will John use to accomplish his task?

  • A. rmdir -v private.txt
  • B. shred -vfu private.txt
  • C. shred -vfuz private.txt
  • D. rm -vf private.txt

Answer: C

NEW QUESTION 11
Which of the following quantifies the effects of a potential disaster over a period of time?

  • A. Risk Assessment
  • B. Business Impact Analysis
  • C. Disaster Recovery Planning
  • D. Lessons Learned

Answer: B

NEW QUESTION 12
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

  • A. TCP port 443
  • B. UDP port 161
  • C. TCP port 110
  • D. UDP port 1701

Answer: D

NEW QUESTION 13
Which of the following is a signature-based intrusion detection system (IDS) ?

  • A. RealSecure
  • B. Snort
  • C. StealthWatch
  • D. Tripwire

Answer: B

NEW QUESTION 14
Which of the following best describes the level of risk associated with using proprietary crypto algorithms.?

  • A. Proprietary cryptographic algorithms are required by law to use shorter key lengths in the United States, so the risk is hig
  • B. Proprietary algorithms have not been subjected to public scrutiny, so they have been checked less throughly for vulnerabilitie
  • C. Proprietary algorithms are less likely be vulnerable than algorithms that have been publicly disclosed because of enhanced secrecy of the algorith
  • D. Proprietary algorithms are not known to generally be any more or less vulnerable than publicly scrutinized algorithm

Answer: B

NEW QUESTION 15
Which Linux file lists every process that starts at boot time?

  • A. inetd
  • B. netsrv
  • C. initd
  • D. inittab

Answer: D

NEW QUESTION 16
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

  • A. RARP
  • B. ARP
  • C. DNS
  • D. RDNS

Answer: A

NEW QUESTION 17
Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

  • A. Anonymous authentication
  • B. Mutual authentication
  • C. Open system authentication
  • D. Shared key authentication

Answer: CD

NEW QUESTION 18
Which of the following TCP dump output lines indicates the first step in the TCP 3-way handshake?

  • A. 07:09:43.368615 download.net 39904 > ftp.com.21: S 733381829:733381829(0) win 8760 <mss 1460> (DF)
  • B. 07:09:43.370302 ftp.com.21 > download.net.39904: S 1192930639:1192930639(0} ack 733381830 win 1024 <mss 1460> (DF)
  • C. 09:09:22.346383 ftp.com.21 > download.net.39904: , rst 1 win 2440(DF)
  • D. 07:09:43.370355 download.net.39904 > ftp.com.21: , ack 1 win 8760 (DF)

Answer: A

NEW QUESTION 19
Which of the following are examples of Issue-Specific policies all organizations should address?

  • A. Perimeter filtering guides, break times for employees, desktop neatness and backup procedure
  • B. Rogue wireless access points, auditing, break time for employees and organizational structur
  • C. Audit logs, physical access, mission statements and network protocols use
  • D. Backup requirements, employee monitoring, physical access and acceptable us

Answer: D

NEW QUESTION 20
......

Thanks for reading the newest GSEC exam dumps! We recommend you to try the PREMIUM Thedumpscentre.com GSEC dumps in VCE and PDF here: https://www.thedumpscentre.com/GSEC-dumps/ (279 Q&As Dumps)