A Review Of Vivid GSEC Braindump

Our pass rate is high to 98.9% and the similarity percentage between our GSEC study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GSEC exam in just one try? I am currently studying for the GIAC GSEC exam. Latest GIAC GSEC Test exam practice questions and answers, Try GIAC GSEC Brain Dumps First.

Online GIAC GSEC free dumps demo Below:

NEW QUESTION 1
The Windows 'tracert' begins by sending what type of packet to the destination host?

  • A. A UDP packet with a TTL of 1
  • B. An ICMP Echo Request
  • C. An ICMP Router Discovery
  • D. An ICMP Echo Reply

Answer: A

NEW QUESTION 2
Which of the following SIP methods is used to setup a new session and add a caller?

  • A. ACK
  • B. BYE
  • C. REGISTER
  • D. INVITE
  • E. CANCEL

Answer: D

NEW QUESTION 3
Which type of risk assessment results are typically categorized as low, medium, or high-risk events?

  • A. Technical
  • B. Qualitative
  • C. Management
  • D. Quantitative

Answer: B

NEW QUESTION 4
Which of the following types of computers is used for attracting potential intruders?

  • A. Files pot
  • B. Honey pot
  • C. Data pot
  • D. Bastion host

Answer: B

NEW QUESTION 5
You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:
* they contain only numerals
* they contain only letters
* they contain only special characters
* they contain only letters and numerals
" they contain only letters and special characters
* they contain only numerals and special characters
Of the following, what is the benefit to using this set of tests?

  • A. They are focused on cracking passwords that use characters prohibited by the password policy
  • B. They find non-compliant passwords without cracking compliant password
  • C. They are focused on cracking passwords that meet minimum complexity requirements
  • D. They crack compliant and non-compliant passwords to determine whether the current policy is strong enough

Answer: B

NEW QUESTION 6
Which of the following works at the network layer and hides the local area network IP address and topology?

  • A. Network address translation (NAT)
  • B. Hub
  • C. MAC address
  • D. Network interface card (NIC)

Answer: A

NEW QUESTION 7
Which of the following are network connectivity devices?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Network analyzer
  • B. Bridge
  • C. Brouter
  • D. Firewall
  • E. Repeater
  • F. Hub

Answer: BCEF

NEW QUESTION 8
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

  • A. netstat -a | grep FTP
  • B. FTP netstat -r
  • C. FTP netstat -a
  • D. netstat -r | grep FTP

Answer: A

NEW QUESTION 9
What type of malware is a self-contained program that has the ability to copy itself without parasitically infecting other host code?

  • A. Trojans
  • B. Boot infectors
  • C. Viruses
  • D. Worms

Answer: D

NEW QUESTION 10
Regarding the UDP header below, what is the length in bytes of the UDP datagrarn?
04 1a 00 a1 00 55 db 51

  • A. 161
  • B. 81
  • C. 219
  • D. 85

Answer: D

NEW QUESTION 11
How many bytes does it take to represent the hexadecimal value OxFEDCBA?

  • A. 12
  • B. 2
  • C. 3
  • D. 6

Answer: C

NEW QUESTION 12
Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?

  • A. Analysis of encrypted traffic
  • B. Provide insight into network traffic
  • C. Detection of network operations problems
  • D. Provide logs of network traffic that can be used as part of other security measure
  • E. Inexpensive to manage
  • F. B, C, and D
  • G. A, C, and E
  • H. B, D, and E
  • I. A, B, and C

Answer: C

NEW QUESTION 13
You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

  • A. Limits on the number of failed logins
  • B. Boundary checks on program inputs
  • C. Controls against time of check/time of use attacks
  • D. Restrictions on file permissions

Answer: C

NEW QUESTION 14
You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

  • A. NETSTAT -s
  • B. NBTSTAT -s
  • C. NBTSTAT -n
  • D. NETSTAT -n

Answer: C

NEW QUESTION 15
Which of the following classes of fire comes under Class C fire?

  • A. Paper or wood fire
  • B. Oil fire
  • C. Combustible metals fire
  • D. Electronic or computer fire

Answer: D

NEW QUESTION 16
You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:
The wireless network communication should be secured.
The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:
Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

  • A. The laptop users will be able to use smart cards for getting authenticate
  • B. Both tasks will be accomplishe
  • C. None of the tasks will be accomplishe
  • D. The wireless network communication will be secure

Answer: D

NEW QUESTION 17
Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

  • A. Information centric defense
  • B. Uniform information protection
  • C. General information protection
  • D. Perimeter layering

Answer: A

NEW QUESTION 18
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

  • A. Privacy policy
  • B. Backup policy
  • C. User password policy
  • D. Network security policy

Answer: A

NEW QUESTION 19
You have an automated system for patching the operating systems of all your computers. All patches are supposedly current. Yet your automated vulnerability scanner has just reported vulnerabilities that you believe have been patched. Which of the actions below should you take next?

  • A. Check some systems manuall
  • B. Rerun the system patching routine
  • C. Contact the incident response tea
  • D. Ignore the findings as false positive

Answer: A

NEW QUESTION 20
......

P.S. Dumps-hub.com now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.dumps-hub.com/GSEC-dumps.html (279 New Questions)