New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GSEC GIAC Security Essentials Questions and Answers

Questions 4

In PKI, when someone wants to verify that the certificate is valid, what do they use to decrypt the signature?

Options:

A.

Receiver's digital signature

B.

X.509 certificate CA's private key

C.

Secret passphrase

D.

CA's public key

Buy Now
Questions 5

What advantage would an attacker have in attacking a web server using the SSL protocol?

Options:

A.

The web server trusts the client because they are using the same secret key.

B.

The attacker needs to generate just one encryption key for all his requests.

C.

The Client can cause the ssl web server to use a weak encryption algorithm.

D.

The encrypted session makes It harder for an Intrusion Detection System to detect.

Buy Now
Questions 6

A web application requires multifactor authentication when a user accesses the application from a home office but does not require this when the user is in the office. What access control model is this describing?

Options:

A.

Lattice based access control

B.

Access control list

C.

Variable trust access control

D.

Role based access control

Buy Now
Questions 7

Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

Options:

A.

Both volumes should be converted to NTFS at install time.

B.

First volume should be FAT32 and second volume should be NTFS.

C.

First volume should be EFS and second volume should be FAT32.

D.

Both volumes should be converted to FAT32 with NTFS DACLs.

Buy Now
Questions 8

You have set up a local area network for your company. Your firewall separates your network into several sections: a DMZ with semi-public servers (web, dns, email) and an intranet with private servers. A penetration tester gains access to both sections and installs sniffers in each. He is able to capture network traffic for all the devices in the private section but only for one device (the device with the sniffer) in the DMZ. What can be inferred about the design of the system?

Options:

A.

You installed a router in the private section and a switch in the DMZ

B.

You installed a hub in the private section and a switch in the DMZ

C.

You installed a switch in the private section and a hub in the DMZ

D.

You installed a switch in the private section and a router in the DMZ

Buy Now
Questions 9

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical

B.

Administrative

C.

Automatic

D.

Technical

Buy Now
Questions 10

An organization keeps its intellectual property in a database. Protection of the data is assigned to one system administrator who marks the data, and monitors for this intellectual property leaving the network. Which defense-In-depth principle does this describe?

Options:

A.

Threat-Vector Analysis

B.

Protected Enclave

C.

Information Centric

D.

Uniform Protection

Buy Now
Questions 11

Which of the following is a characteristic of hash operations?

Options:

A.

Asymmetric

B.

Non-reversible

C.

Symmetric

D.

Variable length output

Buy Now
Questions 12

What type of attack can be performed against a wireless network using the tool Kismet?

Options:

A.

IP spoofing

B.

Eavesdropping

C.

Masquerading

D.

Denial of Service

Buy Now
Questions 13

A system administrator sees the following URL in the webserver logs:

Which action will mitigate against this attack?

Options:

A.

Force all web applications to use SSL/US

B.

Encode web traffic using Base64 before transmission

C.

Filter potentially harmful characters from user input

D.

Authenticate users before allowing database queries

Buy Now
Questions 14

Use PowerShell ISE to

examineC:\Windows\security\templates\WorkstationSecureTemplate.inf. Which setting is configured in the template?

Options:

A.

ResetLockoutCount

B.

NewAdministratorName

C.

MinirnumPasswordAge

D.

Require logonToChangoPassword

E.

SeRemotPlnteractiveLogonRlght

F.

MaxRenewAge

G.

AuditSystemEvents

Buy Now
Questions 15

Which of the following applications would be BEST implemented with UDP instead of TCP?

Options:

A.

A multicast streaming application.

B.

A web browser.

C.

A DNS zone transfer.

D.

A file transfer application.

Buy Now
Questions 16

Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?

Options:

A.

Vulnerability scanner and auditing tool

B.

Auditing tool and alerting system

C.

Configuration management and alerting system

D.

Security patching and vulnerability scanner

Buy Now
Questions 17

What is the discipline of establishing a known baseline and managing that condition known as?

Options:

A.

Condition deployment

B.

Observation discipline

C.

Security establishment

D.

Configuration management

Buy Now
Questions 18

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses TCP port 443 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It is a protocol used to provide security for a database server in an internal network.

D.

It uses TCP port 80 as the default port.

Buy Now
Questions 19

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

HIDS

C.

NIDS

D.

RADIUS

Buy Now
Questions 20

Which of the following is a benefit to utilizing Cygwin for Windows?

Options:

A.

The ability to install a complete Red Hat operating system Install on Windows.

B.

The ability to bring much more powerful scripting capabilities to Windows.

C.

The ability to run a production Apache server.

D.

The ability to install a complete Ubuntu operating system install on Windows.

Buy Now
Questions 21

What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?

Options:

A.

Decode the message by decrypting the asymmetric key with his private key, then using the asymmetric key to decrypt the message.

B.

Decode the message by decrypting the symmetric key with his private key, then using the symmetric key to decrypt the message.

C.

Decode the message by decrypting the symmetric key with his public key, then using the symmetric key to decrypt the message.

D.

Decrypt the message by encrypting the digital signature with his private key, then using the digital signature to decrypt the message.

Buy Now
Questions 22

What does it mean if a protocol such as HTTP is stateless?

Options:

A.

The client responds to server request and keeps track of the conversation.

B.

If a stateless protocol is used it cannot be traced.

C.

It means it is unreliable.

D.

The server responds to a single request and then forgets about it.

Buy Now
Questions 23

What is the purpose of a TTL value?

Options:

A.

It represents of hops that a packet can take before being discarded.

B.

It represents the time in minutes that a packet can live before being discarded.

C.

It represents the value that the sequence number should be Incremented by during the next communication.

D.

It represents the number of gateways the packet has passed through and is Increased by 1 for each hop.

Buy Now
Questions 24

What is the SHA1 hash of the Ale /bin/Is?

Options:

A.

a895bac9c3

B.

54771b4r

C.

a39bed3C496fC764fc518d3e2d56f7d0f4C625fb

D.

93c1 ffbd22ebcad798886fb4aa46fa 357b23d80a

E.

aa40739f465ded2245872b1e4972e33d5bObb1cb

F.

494a 192859f 244c69d5bdc46255d b44l9e 7d051 f

G.

d3a21675a8f 19518d8b8f3cefOf6a21 del da6cc7

Buy Now
Questions 25

Which of the following is used to allow or deny access to network resources?

Options:

A.

Spoofing

B.

ACL

C.

System hardening

D.

NFS

Buy Now
Questions 26

You are doing some analysis of malware on a Unix computer in a closed test network. The IP address of the computer is 192.168.1.120. From a packet capture, you see the malware is attempting to do a DNS query for a server called iamabadserver.com so that it can connect to it. There is no DNS server on the test network to do name resolution. You have another computer, whose IP is 192.168.1.115, available on the test network that you would like for the malware connect to it instead. How do you get the malware to connect to that computer on the test network?

Options:

A.

You modify the HOSTS file on the computer you want the malware to connect to and add an entry that reads: 192.168.1.120 iamabadserver iamabadserver.com

B.

You modify the HOSTS file on the Unix computer your malware is running on and add an entry that reads: 192.168.1.115 iamabadserveriamabadserver.com

C.

You modify the HOSTS file on the Unix computer your malware is running on and add an entry that reads: 192.168.1.120 iamabadserver iamabadserver.com

D.

You modify the HOSTS file on the computer you want the malware to connect to and add an entry that reads: 192.168.1.115 iamabadserver iamabadserver.com

Buy Now
Questions 27

The TTL can be found in which protocol header?

Options:

A.

It is found in byte 8 of the ICMP header.

B.

It is found in byte 8 of the IP header.

C.

It is found in byte 8 of the TCP header.

D.

It is found in byte 8 of the DNS header.

Buy Now
Questions 28

In trace route results, what is the significance of an * result?

Options:

A.

A listening port was identified.

B.

A reply was returned in less than a second.

C.

The target host was successfully reached.

D.

No reply was received for a particular hop.

Buy Now
Questions 29

You work as an Administrator for McRoberts Inc. The company has a Linux-based network. You are logged in as a non-root user on your client computer. You want to delete all files from the /garbage directory. You want that the command you will use should prompt for the root user password. Which of the following commands will you use to accomplish the task?

Options:

A.

rm -rf /garbage*

B.

del /garbage/*.*

C.

rm -rf /garbage* /SU

D.

su -c "RM -rf /garbage*"

Buy Now
Questions 30

Based on the iptables output below, which type of endpoint security protection has host 192.168.1.17 implemented for incoming traffic on TCP port 22 (SSH) and TCP port 23 (telnet)?

Options:

A.

Operating System Control Firewall

B.

Application Control Firewall

C.

Exclusive Logging Analysis

D.

Packet Filtering Firewall

E.

Application Execution Control

Buy Now
Questions 31

What protocol is a WAN technology?

Options:

A.

802.11

B.

802.3

C.

Ethernet

D.

Frame Relay

Buy Now
Questions 32

What does PowerShell remoting use to authenticate to another host in a domain environment?

Options:

A.

Two factor codes

B.

Unique application passwords

C.

PreShared keys

D.

Kerberos tickets

Buy Now
Questions 33

Which of the following proxy servers provides administrative controls over the content?

Options:

A.

Content filtering web proxy server

B.

Caching proxy server

C.

Forced proxy server

D.

Web proxy server

Buy Now
Questions 34

Your software developer comes to you with an application that controls a user device. The application monitors its own behavior and that of the device and creates log files. The log files are expected to grow steadily and rapidly. Your developer currently has the log files stored in the /bin folder with the application binary. Where would you suggest that the developer store the log files?

Options:

A.

/var/log

B.

/etc/log

C.

/usr/log

D.

/tmp/log

E.

/dev/log

Buy Now
Questions 35

What is the command-line tool for Windows XP and later that allows administrators the ability to get or set configuration data for a very wide variety of computer and user account settings?

Options:

A.

IPCONFIG.EXE

B.

NETSTAT.EXE

C.

WMIC.EXE

D.

C0NF1G.EXE

Buy Now
Questions 36

What is the motivation behind SYN/FIN scanning?

Options:

A.

The SYN/FIN combination is useful for signaling to certain Trojans.

B.

SYN/FIN packets are commonly used to launch denial of service attacks against BSD hosts.

C.

The crafted SYN/FIN packet sometimes gets past firewalls and filtering routers.

D.

A SYN/FIN packet is used in session hijacking to take over a session.

Buy Now
Questions 37

What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?

Options:

A.

These fields are decremented each time a packet is retransmitted to minimize the possibility of routing loops.

B.

These fields are initialized to an initial value to prevent packet fragmentation and fragmentation attacks.

C.

These fields are recalculated based on the required time for a packet to arrive at its destination.

D.

These fields are incremented each time a packet is transmitted to indicate the number of routers that an IP packet has traversed.

Buy Now
Questions 38

Which of the following is a potential WPA3 security issue?

Options:

A.

Backward compatibility

B.

Disassociate frame DoS

C.

Traffic decryption with PSK

D.

Short key lengths

Buy Now
Questions 39

What is the first thing that should be done during the containment step of incident handling?

Options:

A.

Change all the passwords

B.

Secure the area

C.

Prepare the Jump bag

D.

Notify management

E.

Prepare a report

Buy Now
Questions 40

Which of the following would be used to explicitly deny the traffic from a foreign IP address scanning the EC2 Instances in a VPC?

Options:

A.

Security Group

B.

B. VPC Endpoint

C.

C. Network ACL

D.

D. Internet Gateway

Buy Now
Questions 41

You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?

Options:

A.

ls

B.

chroot

C.

route

D.

chdir

Buy Now
Questions 42

In an Active Directory domain, which is the preferred method of keeping host computers patched?

Options:

A.

Deliver updates from a local server through Windows Server Update Services

B.

Deliver updates through a web caching proxy for faster installation

C.

Configure Microsoft Update to run automatically on each host

D.

Download Hotfixes daily, and Service packs monthly, for each operating system.

Buy Now
Questions 43

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It reduces the need for globally unique IP addresses.

B.

It allows external network clients access to internal services.

C.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Buy Now
Questions 44

What is the main reason that DES is faster than RSA?

Options:

A.

DES is less secure.

B.

DES is implemented in hardware and RSA is implemented in software.

C.

Asymmetric cryptography is generally much faster than symmetric.

D.

Symmetric cryptography is generally much faster than asymmetric.

Buy Now
Questions 45

Which of the following are examples of Issue-Specific policies all organizations should address?

Options:

A.

Perimeter filtering guides, break times for employees, desktop neatness and backup procedures.

B.

Rogue wireless access points, auditing, break time for employees and organizational structure.

C.

Audit logs, physical access, mission statements and network protocols used.

D.

Backup requirements, employee monitoring, physical access and acceptable use.

Buy Now
Questions 46

How does a default deny rule in a firewall prevent unknown attacks?

Options:

A.

Slops users from clicking on known bad URIs.

B.

Forbids outbound access with unknown payload.

C.

Blocks packets that are not explicitly allowed.

D.

Refuses packets that match a defined set of rules

Buy Now
Questions 47

Which of the following is a valid password for a system with the default "Password must meet complexity requirements" setting enabled as part of the GPO Password policy requirements?

Options:

A.

The Cat Chased its Tail AII Night

B.

disk ACCESS failed

C.

SETI@HOME

D.

SaNS2006

Buy Now
Questions 48

Which layer of the TCP/IP Protocol Stack Is responsible for port numbers?

Options:

A.

Network

B.

Transport

C.

Internet

D.

Application

Buy Now
Questions 49

Analyze the file below. When will the program /home/sink/utils/remove temp hies.py run?

Options:

A.

When a user requests it by connecting to the listening port

B.

When the user 'sink' logs in

C.

At startup when the system enters the multi-user runlevel

D.

At the time specified in the crontab file

Buy Now
Questions 50

To update from a Windows Server Update Services (WSUS) server, users of the machine must have what rights, If any?

Options:

A.

No user tights are required

B.

Network User

C.

Local User

D.

Local Administrator

Buy Now
Questions 51

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They allow an attacker to conduct a buffer overflow.

B.

They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

C.

They allow an attacker to replace utility programs that can be used to detect the attacker's activity.

D.

They allow an attacker to run packet sniffers secretly to capture passwords.

Buy Now
Questions 52

If Linux server software is a requirement in your production environment which of the following should you NOT utilize?

Options:

A.

Debian

B.

Mandrake

C.

Cygwin

D.

Red Hat

Buy Now
Questions 53

Analyze the following screenshot. What conclusion can be drawn about the user account shown?

Options:

A.

The user is a domain administrator

B.

The user has a guest privilege level

C.

The user is a local administrator

D.

The user is not authenticated on the domain

Buy Now
Questions 54

Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap.

What is the source port number?

Options:

A.

878733706

B.

123

C.

443

D.

878732274

E.

36480

F.

2398730476

G.

1432

Buy Now
Questions 55

The TTL can be found in which protocol header?

Options:

A.

UDP

B.

TCP

C.

IP

D.

ICMP

Buy Now
Questions 56

Which of the four basic transformations in the AES algorithm involves the leftward circular movement of state data?

Options:

A.

SubBytes

B.

MixColumns

C.

AddRoundKey

D.

Shift Rows

Buy Now
Questions 57

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

Options:

A.

Blowfish

B.

DES

C.

SHA-l

D.

Cast

Buy Now
Questions 58

Analyze the screenshot below. What is the purpose of this message?

Options:

A.

To gather non-specific vulnerability information

B.

To get the user to download malicious software

C.

To test the browser plugins for compatibility

D.

To alert the user to infected software on the computer.

Buy Now
Questions 59

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

rm private.txt #11 Nov 2009 02:59:58 am

B.

touch -d "11 Nov 2009 02:59:58 am" private.txt

C.

touch private.txt #11 Nov 2009 02:59:58 am

D.

touch -t 200911110259.58 private.txt

Buy Now
Questions 60

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:

A.

Halon

B.

CO2

C.

Soda acid

D.

Water

Buy Now
Questions 61

Which of the following access control principles helps prevent collusion and detect abuse of access?

Options:

A.

Least privilege

B.

Rotation of duties

C.

Separation of duties

D.

Need to know

Buy Now
Questions 62

Which Authenticates Assurance Level requires a hardware-based authenticates?

Options:

A.

AAI1

B.

AAL3

C.

AAL2

Buy Now
Questions 63

Use Wireshark to analyze Desktop;PCAP FILES/charile.pcap

What is the destination IP address in packet #3?

Options:

A.

192.168.184.2

B.

192.168.184.73

C.

192.168.184.129

D.

192.168.184.111

E.

197.168.184.13

F.

197.168.184.158

G.

192.168.184.201

Buy Now
Questions 64

Which field in the IPv6 header is used for QoS. or specifying the priority of the packet?

Options:

A.

Hop Limit

B.

Traffic Class

C.

Version

D.

Next Header

Buy Now
Questions 65

Which of the following is required to be backed up on a domain controller to recover Active Directory?

Options:

A.

System state data

B.

Operating System files

C.

User's personal data

D.

Installed third party application's folders

Buy Now
Questions 66

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTFS gives better file security than FAT16 and FAT32.

B.

Automatic backup.

C.

NTFS file system supports for larger hard disks.

D.

NTFS give improved disk compression than FAT16 and FAT32.

Buy Now
Questions 67

Which of the following is TRUE regarding Ethernet?

Options:

A.

Stations are not required to monitor their transmission to check for collisions.

B.

Several stations are allowed to be transmitting at any given time within a single collision domain.

C.

Ethernet is shared media.

D.

Stations are not required to listen before they transmit.

Buy Now
Questions 68

Which of the following is an advantage of a Host Intrusion Detection System (HIDS) versus a Network Intrusion Detection System (NIDS)?

Options:

A.

Ability to detect malicious traffic after it has been decrypted by the host

B.

Ability to decrypt network traffic

C.

Ability to listen to network traffic at the perimeter

D.

Ability to detect malicious traffic before it has been decrypted

Buy Now
Questions 69

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

Options:

A.

The laptop users will be able to use smart cards for getting authenticated.

B.

Both tasks will be accomplished.

C.

None of the tasks will be accomplished.

D.

The wireless network communication will be secured.

Buy Now
Questions 70

Which of the following works at the network layer and hides the local area network IP address and topology?

Options:

A.

Network address translation (NAT)

B.

Hub

C.

MAC address

D.

Network interface card (NIC)

Buy Now
Questions 71

Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

Options:

A.

Information centric defense

B.

Uniform information protection

C.

General information protection

D.

Perimeter layering

Buy Now
Questions 72

Use sudo to launch Snort with the, /etc /snort /snort.conf file In full mode to generate alerts based on incoming traffic to echo. What is the source IP address of the traffic triggering an alert with a destination port of 156?

Note: Snort Is configured to exit after It evaluates 50 packets.

Options:

A.

192.168.^.30

B.

10.72.101.210

C.

10.10.28.19

D.

10.11.10.11

E.

10.10.10.66

F.

192.168.87.68

G.

10.12.10.112

Buy Now
Questions 73

Which of the following tools is also capable of static packet filtering?

Options:

A.

netstat.exe

B.

ipsecpol.exe

C.

ipconfig.exe

D.

net.exe

Buy Now
Questions 74

Which of the following choices accurately describes how PGP works when encrypting email?

Options:

A.

PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric key.

B.

PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

C.

PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

D.

PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric key.

Buy Now
Questions 75

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?

Options:

A.

mv $shell

B.

echo $shell

C.

rm $shell

D.

ls $shell

Buy Now
Questions 76

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

RealSecure

B.

Snort

C.

StealthWatch

D.

Tripwire

Buy Now
Questions 77

There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?

Options:

A.

Provides end-to-end data delivery service for user applications

B.

Handles the routing of the data packets over the network

C.

Manages IP addressing and encryption for data packets

D.

Defines the procedures for interfacing with Ethernet devices

Buy Now
Questions 78

Which class of IDS events occur when the IDS fails to alert on malicious data?

Options:

A.

True Negative

B.

True Positive

C.

False Positive

D.

False Negative

Buy Now
Questions 79

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Options:

A.

80

B.

25

C.

20

D.

110

Buy Now
Questions 80

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Privacy policy

B.

Backup policy

C.

User password policy

D.

Network security policy

Buy Now
Questions 81

Which practice can help protect secrets in a cloud environment?

Options:

A.

Avoiding the use of Terraform variables

B.

Running privileged docker runtime

C.

Excluding the tfstate file from code repositories

D.

Using the -net-host flag

Buy Now
Questions 82

What would the following IP tables command do?

IP tables -I INPUT -s 99.23.45.1/32 -j DROP

Options:

A.

Drop all packets from the source address

B.

Input all packers to the source address

C.

Log all packets to or from the specified address

D.

Drop all packets to the specified address

Buy Now
Questions 83

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

SSL

B.

HTTP

C.

TLS

D.

SNMP

Buy Now
Questions 84

When are Group Policy Objects (GPOs) NOT applied automatically to workstations?

Options:

A.

At 90-minute intervals

B.

At logon

C.

Every time Windows Explorer is launched

D.

At boot-up

Buy Now
Questions 85

You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

Options:

A.

Limits on the number of failed logins

B.

Boundary checks on program inputs

C.

Controls against time of check/time of use attacks

D.

Restrictions on file permissions

Buy Now
Questions 86

Which of the following utilities can be used to manage the Windows Firewall (WF) from the command line?

Options:

A.

secedit.exe

B.

sc.exe

C.

netsh.exe

D.

net.exe

Buy Now
Questions 87

Rainbow Tables are used in what kind of password cracking?

Options:

A.

Brute-Force

B.

Dictionary

C.

Hybrid Attack

D.

Pre-Computation

Buy Now
Questions 88

What is the key difference between Electronic Codebook mode and other block cipher modes like Cipher Block Chaining, Cipher-Feedback and Output-Feedback?

Options:

A.

Plaintext patterns are concealed by XO Ring with previous cipher text block but input to the block cipher is not randomized.

B.

Plaintext patterns are concealed and input to the block cipher is randomized by XO Ring with previous cipher text block.

C.

Plaintext patterns encrypted with the same key will always generate the same

Cipher text pattern

D.

Plaintext patterns are not concealed but input to the block cipher is randomized by XO Ring with previous cipher text block.

Buy Now
Questions 89

What Windows log should be checked to troubleshoot a Windows service that is falling to start?

Options:

A.

Application

B.

System

C.

Security

D.

Setup

Buy Now
Questions 90

Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?

Hints

• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory /home /giac /PasswordHashing/

• Run Hashcat in straight mode (flag -a 0) to crack the MD5 hashes (flag -m 500) In the shadow file.

• Use the hash values from the Hashcat output file and the shadow file to match the cracked password with the user name.

• If required, a backup copy of the original files can be found in the shadowbackup directory.

Options:

A.

52345234

B.

YOuRF ether?

C.

symbiote

D.

Volcano

E.

QX689PJ688

F.

LlqMM@qe

G.

Noregrets2

Buy Now
Questions 91

What is needed for any of the four options for Azure AD multi-factor user authentication?

Options:

A.

Fingerprint reader

B.

Web cam

C.

Phone

D.

Iris scan

Buy Now
Questions 92

Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?

Options:

A.

Hotfix

B.

Spam

C.

Biometrics

D.

Buffer overflow

Buy Now
Questions 93

Which of the following processes Is used to prove a user Is who they claim to be based upon something they know, have, are, and/or their physical location?

Options:

A.

Authorization

B.

Accounting

C.

Administration

D.

Authentication

E.

Identification

Buy Now
Questions 94

What would the file permission example "rwsr-sr-x" translate to in absolute mode?

Options:

A.

1755

B.

6755

C.

6645

D.

1644

Buy Now
Questions 95

You work as a Network Administrator for McNeil Inc. You are installing an application. You want to view the log file whenever a new entry is added to the /var/log/messages log file. Which of the following commands will you use to accomplish this?

Options:

A.

TAIL -show /var/log/messages

B.

TAIL -f /var/log/messages

C.

TAIL -50 /var/log/messages

D.

TAIL -view /var/log/messages

Buy Now
Questions 96

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

Options:

A.

NAT

B.

State Table

C.

Logging

D.

Content filtering

Buy Now
Questions 97

Which services will have listening ports on a hardened Linux log server?

Options:

A.

RPC and SMTP

B.

TFTP and telnet

C.

SSH and syslog

D.

HTTP and SFTP

Buy Now
Questions 98

What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?

Options:

A.

Risk of system crashes and security alerts.

B.

Risk of deletion of backup files.

C.

Risk of modified application configuration files.

D.

Risk of applying untested patches.

Buy Now
Questions 99

Which of the following is a Personal Area Network enabled device?

Options:

A.

Corporate access point extender

B.

Bluetooth mouse

C.

Home Win router

D.

Network enabled printer

Buy Now
Questions 100

You are examining a packet capture session in Wire shark and see the packet shown in the accompanying image. Based on what you see, what is the appropriate protection against this type of attempted attack?

Options:

A.

Block DNS traffic across the router

B.

Disable forwarding of unsolicited TCP requests

C.

Disable IP-directed broadcast requests

D.

Block UDP packets at the firewall

Buy Now
Questions 101

A Network Engineer is charged with maintaining and protecting a network with a high availability requirement. In addition to other defenses, they have chosen to implement a NIPS. How should the NIPS failure conditions be configured to ensure availability if the NIPS is installed in front of the Firewall that protects the DMZ?

Options:

A.

Fail safe

B.

Fail smart

C.

Fail-closed

D.

Fail-open

Buy Now
Questions 102

A Windows administrator wants to automate local and remote management tasks in Active Directory. Which tool is most appropriate for this?

Options:

A.

Ipsec

B.

VisualBasic

C.

PowerShell

D.

netsh

E.

ipconfig

Buy Now
Questions 103

Which AWS service integrates with the Amazon API Gateway to provision and renew TLS encryption needs for data in transit?

Options:

A.

Certificate Manager

B.

Key Management Server

C.

Web Application firewall

D.

Security Token Service

Buy Now
Questions 104

An attacker is able to trick an IDS into ignoring malicious traffic through obfuscation of the packet payload. What type of IDS error has occurred?

Options:

A.

True Negative

B.

True Positive

C.

False Positive

D.

False Negative

Buy Now
Questions 105

Which of the following statements about DMZ are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the boundary between the Internet and a private network.

B.

It is an anti-virus software that scans the incoming traffic on an internal network.

C.

It contains company resources that are available on the Internet, such as Web servers and

FTP servers.

D.

It contains an access control list (ACL).

Buy Now
Questions 106

What is a limitation of deploying HIPS on a workstation?

Options:

A.

Requires more frequent system patching

B.

Requires an HIDS to Identify an attack

C.

Restricted support for custom applications

D.

Runs as a non-privileged user

Buy Now
Questions 107

You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

Options:

A.

killall httpd

B.

endall httpd

C.

kill httpd

D.

end httpd

Buy Now
Questions 108

A database is accessed through an application that users must authenticate with, on a host that only accepts connections from a subnet where the business unit that uses the data is located. What defense strategy is this?

Options:

A.

Information Centric

B.

Threat Modeling

C.

Uniform Production

D.

Vector Oriented

Buy Now
Questions 109

In addition to securing the operating system of production honey pot hosts, what is recommended to prevent the honey pots from assuming the identities of production systems that could result in the denial of service for legitimate users?

Options:

A.

Deploy the honey pot hosts as physically close as possible to production systems.

B.

Deploy the honey pot hosts in an unused part of your address space.

C.

Deploy the honey pot hosts to only respond to attacks.

D.

Deploy the honey pot hosts on used address space.

Buy Now
Questions 110

Who is responsible for deciding the appropriate classification level for data within an organization?

Options:

A.

Data custodian

B.

Security auditor

C.

End user

D.

Data owner

Buy Now
Questions 111

What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?

Options:

A.

Template application should be done remotely

B.

Templates must be received from a domain controller

C.

Template application requires domain administrator rights

D.

Template application cannot be automatically reversed

Buy Now
Questions 112

You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company's business systems?

Options:

A.

It may harm otherwise healthy systems.

B.

It may produce false negative results.

C.

It may generate false positive results.

D.

It may not return enough benefit for the cost.

Buy Now
Questions 113

Which of the following networking topologies uses a hub to connect computers?

Options:

A.

Bus

B.

Ring

C.

Star

D.

Cycle

Buy Now
Questions 114

Which access control mechanism requires a high amount of maintenance since all data must be classified, and all users granted appropriate clearance?

Options:

A.

Mandatory

B.

Discretionary

C.

Rule set-based

D.

Role-Based

Buy Now
Questions 115

When Net Stumbler is initially launched, it sends wireless frames to which of the following addresses?

Options:

A.

Broadcast address

B.

Default gateway address

C.

Subnet address

D.

Network address

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Last Update: Dec 22, 2024
Questions: 385

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99