Download Free GIAC GSEC PDF and VCE Updated Today
Vendor: GIAC
Exam Code: GSEC
Exam Name: GIAC Security Essentials
QUESTION 1
Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct answer represents a complete solution. Choose all that apply.
A. SSL provides message integrity to prevent alteration to the message.
B. During SSL session, information is encrypted to prevent unauthorized disclosure.
C. SSL can process credit cards.
D. SSL can support 128-bit encryption.
Answer: ABD
QUESTION 2
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
A. IGMP
B. TCP
C. ARP
D. ICMP
Answer: A
QUESTION 3
Which of the following is not an encryption technology?
A. Blowfish
B. KILL
C. 3DES
D. MD5
Answer: B
QUESTION 4
Which of the following statements about the availability concept of Information security management is true?
A. It ensures reliable and timely access to resources.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
D. It ensures that modifications are not made to data by unauthorized personnel or processes.
Answer: A
QUESTION 5
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports?
A. 100 meters
B. 480 meters
C. 1000 meters
D. 10 meters
Answer: A
QUESTION 6
The /cat/etc/passwd file on a client computer contains the following entry: Martha:x:::::bin/false
Which of the following is true for Martha?
A. Martha’s password is x.
B. Martha has full access on the computer.
C. Martha has limited access on the computer.
D. Martha has been denied access on the computer.
Answer: D
QUESTION 7
Which of the following terms is synonymous with the willful destruction of another person’s property?
A. Spoofing
B. Hacking
C. Phishing
D. Vandalism
Answer: D
QUESTION 8
Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?
A. Cookies
B. Sam Spade
C. NIDS
D. ACL
Answer: D
QUESTION 9
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He executes the following command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?
A. root, 500
B. root, 0
C. John, 502
D. John, 0
Answer: B
QUESTION 10
Which of the following is a security threat if included in the search path of a computer?
A. /usr
B. /sbin
C. .
D. /usr/bin
Answer: C
QUESTION 11
Which of the following directories contains the log files in Linux?
A. /log
B. /root
C. /var/log
D. /etc
Answer: C
QUESTION 12
Which of the following statements are true about satellite broadband Internet access? Each correct answer represents a complete solution. Choose two.
A. It is among the least expensive way of gaining broadband Internet access.
B. It is among the most expensive way of gaining broadband Internet access.
C. This type of internet access has low latency compared to other broadband services.
D. This type of internet access has high latency compared to other broadband services.
Answer: BD
QUESTION 13
You want to temporarily change your primary group to another group of which you are a member. In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?
A. newgrp
B. chgrp
C. chown
D. chmod
Answer: A
QUESTION 14
Rick works as a Network Administrator. He is configuring the systems for maximum security. Before using the security template, he wants to edit it to change some of the security settings that are not required for now. Which of the following tools will he choose, to edit the security template?
A. Group Policy MMC snap-in
B. Security Configuration and Analysis MMC snap-in
C. Security Templates MMC snap-in
D. SECEDIT utility
Answer: C
QUESTION 15
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
A. Patent
B. Artistic license
C. Phishing
D. Spam
Answer: A
QUESTION 16
Which of the following ports is the default port for IMAP4 protocol?
A. TCP port 443
B. TCP port 143
C. TCP port 25
D. TCP port 80
Answer: B
QUESTION 17
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company’s network. Which of the following encryption types will Linux use?
A. MSCHAP
B. RC2
C. 3DES
D. CHAP
Answer: C
QUESTION 18
You work as a Linux Technician for Tech Perfect Inc. You want to protect your server from intruders who exploit services that are started with TCP Wrappers. Which of the following files will help you protect the server?
Each correct answer represents a part of the solution. Choose two.
A. httpd.conf
B. lilo.conf
C. hosts.deny
D. hosts.allow
Answer: CD
QUESTION 19
Which of the following statements about service pack are true? Each correct answer represents a complete solution. Choose two.
A. It is a collection of Fixes and Patches in a single product.
B. It is a medium by which product updates are distributed.
C. It is a term generally related to security problems in a software.
D. It is a term used for securing an operating system.
Answer: AB
QUESTION 20
Which of the following tools is similar to the ping tool but operates at OSI data link layer using the address resolution protocol?
A. ARP
B. NSLOOKUP
C. NETSTAT
D. TRACERT
Answer: A
If you want to pass GIAC GSEC successfully, donot missing to read latest lead2pass GIAC GSEC practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.
http://www.lead2pass.com/GSEC.html
Why Choose Lead2pass?
If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.
Lead2pass | Testking | Pass4sure | Actualtests | Others | |
$99.99 | $124.99 | $125.99 | $189 | $29.99-$49.99 | |
Up-to-Dated | ✔ | ✖ | ✖ | ✖ | ✖ |
Real Questions | ✔ | ✖ | ✖ | ✖ | ✖ |
Error Correction | ✔ | ✖ | ✖ | ✖ | ✖ |
Printable PDF | ✔ | ✖ | ✖ | ✖ | ✖ |
Premium VCE | ✔ | ✖ | ✖ | ✖ | ✖ |
VCE Simulator | ✔ | ✖ | ✖ | ✖ | ✖ |
One Time Purchase | ✔ | ✖ | ✖ | ✖ | ✖ |
Instant Download | ✔ | ✖ | ✖ | ✖ | ✖ |
Unlimited Install | ✔ | ✖ | ✖ | ✖ | ✖ |
100% Pass Guarantee | ✔ | ✖ | ✖ | ✖ | ✖ |
100% Money Back | ✔ | ✖ | ✖ | ✖ | ✖ |