How Many Questions Of GSEC Free Exam Questions

Act now and download your GIAC GSEC test today! Do not waste time for the worthless GIAC GSEC tutorials. Download Improve GIAC GIAC Security Essentials Certification exam with real questions and answers and begin to learn GIAC GSEC with a classic professional.

Free demo questions for GIAC GSEC Exam Dumps Below:

NEW QUESTION 1
Which of the following statements about Microsoft's VPN client software is FALSE?

  • A. The VPN interface can be figured into the route tabl
  • B. The VPN interface has the same IP address as the interface to the network it's been specified to protec
  • C. The VPN client software is built into the Windows operating syste
  • D. The VPN tunnel appears as simply another adapte

Answer: B

NEW QUESTION 2
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

  • A. TCP port 443
  • B. UDP port 161
  • C. TCP port 110
  • D. UDP port 1701

Answer: D

NEW QUESTION 3
Which of the following should be implemented to protect an organization from spam?

  • A. Auditing
  • B. System hardening
  • C. E-mail filtering
  • D. Packet filtering

Answer: C

NEW QUESTION 4
What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

  • A. SCHTASKS.EXE
  • B. SCHEDULETSKS.EXE
  • C. SCHEDULR.EXE
  • D. SCHRUN.EXE

Answer: A

NEW QUESTION 5
Which of the following is a name, symbol, or slogan with which a product is identified?

  • A. Copyright
  • B. Trademark
  • C. Trade secret
  • D. Patent

Answer: B

NEW QUESTION 6
Which of the following protocols describes the operation of security In H.323? A. H.239

  • A. H.245
  • B. H.235
  • C. H.225

Answer: C

NEW QUESTION 7
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

  • A. RARP
  • B. ARP
  • C. DNS
  • D. RDNS

Answer: A

NEW QUESTION 8
Which of the following is the reason of using Faraday cage?

  • A. To prevent Denial-of-Service (DoS) attack
  • B. To prevent shoulder surfing
  • C. To prevent mail bombing
  • D. To prevent data emanation

Answer: D

NEW QUESTION 9
Which of the following languages enable programmers to store cookies on client computers? Each correct answer represents a complete solution. Choose two.

  • A. DHTML
  • B. Perl
  • C. HTML
  • D. JavaScript

Answer: BD

NEW QUESTION 10
Which Host-based IDS (HIDS) method of log monitoring utilizes a list of keywords or phrases that define the events of interest for the analyst, then takes a list of keywords to watch for and generates alerts when it sees matches in log file activity?

  • A. Passive analysis
  • B. Retroactive analysis
  • C. Exclusive analysis
  • D. Inclusive analysis

Answer: D

NEW QUESTION 11
Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?

  • A. Eavesdropping attacks cannot be performed through concrete wall
  • B. Eavesdropping attacks can take place from miles awa
  • C. Eavesdropping attacks are easily detected on wireless network
  • D. Eavesdropping attacks require expensive device

Answer: B

NEW QUESTION 12
What is the unnoticed theft of sensitive data from a laptop owned by an organization's CEO an example of in information warfare?

  • A. Non-zero sum game
  • B. Win-win situation
  • C. Zero-sum game
  • D. Symmetric warfare

Answer: D

NEW QUESTION 13
Which of the following is a benefit of using John the Ripper for auditing passwords?

  • A. John's Blowfish cracking routine uses a complex central computing loop that increases the cost of each hash computatio
  • B. John the Ripper is much slower for auditing passwords encrypted with MD5 and Blowfis
  • C. John's MD5 cracking routine uses a simplified central computing loop that decreases the cost of each hash computatio
  • D. John cannot use the DES bit-slicing technique, so it is much slower than other tools, especially when used against DES-encrypted password

Answer: C

NEW QUESTION 14
Which of the following files contains the shadowed password entries in Linux?

  • A. /etc/passwd
  • B. /etc/shadow
  • C. /etc/profile
  • D. /etc/shdpwd

Answer: B

NEW QUESTION 15
In PKI, when someone wants to verify that the certificate is valid, what do they use to decrypt the signature?

  • A. Receiver's digital signature
  • B. X.509 certificate CA's private key
  • C. Secret passphrase
  • D. CA's public key

Answer: D

NEW QUESTION 16
Which of the following is an advantage of private circuits versus VPNs?

  • A. Flexibility
  • B. Performance guarantees
  • C. Cost
  • D. Time required to implement

Answer: B

NEW QUESTION 17
Where could you go in Windows XP/2003 to configure Automatic Updates?

  • A. Right click on the Start Menu and choose select Properties in the pop-up Men
  • B. Open the MMC and choose the Automatic Updates snap-i
  • C. Right click on your desktop and choose the automatic update
  • D. Go to the System applet in Control Panel and click on the Automatic Updates ico

Answer: D

NEW QUESTION 18
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

  • A. Visitors
  • B. Customers
  • C. Employees
  • D. Hackers

Answer: C

NEW QUESTION 19
What is the first thing that should be done during the containment step of incident handling?

  • A. Change all the passwords
  • B. Secure the area
  • C. Prepare the Jump bag
  • D. Notify management
  • E. Prepare a report

Answer: B

NEW QUESTION 20
......

P.S. Easily pass GSEC Exam with 279 Q&As Dumps-files.com Dumps & pdf Version, Welcome to Download the Newest Dumps-files.com GSEC Dumps: https://www.dumps-files.com/files/GSEC/ (279 New Questions)