★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GSEC Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/GSEC-dumps.html


Your success in GIAC GSEC is our sole target and we develop all our GSEC braindumps in a way that facilitates the attainment of this target. Not only is our GSEC study material the best you can find, it is also the most detailed and the most updated. GSEC Practice Exams for GIAC GSEC are written to the highest standards of technical accuracy.

Free demo questions for GIAC GSEC Exam Dumps Below:

NEW QUESTION 1
Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?
Each correct answer represents a complete solution. Choose two.

  • A. The client can optionally authenticate the serve
  • B. The client always authenticates the serve
  • C. The server always authenticates the clien
  • D. The server can optionally authenticate the clien

Answer: BD

NEW QUESTION 2
You have an automated system for patching the operating systems of all your computers. All patches are supposedly current. Yet your automated vulnerability scanner has just reported vulnerabilities that you believe have been patched. Which of the actions below should you take next?

  • A. Check some systems manuall
  • B. Rerun the system patching routine
  • C. Contact the incident response tea
  • D. Ignore the findings as false positive

Answer: A

NEW QUESTION 3
Which Linux file lists every process that starts at boot time?

  • A. inetd
  • B. netsrv
  • C. initd
  • D. inittab

Answer: D

NEW QUESTION 4
Where could you go in Windows XP/2003 to configure Automatic Updates?

  • A. Right click on the Start Menu and choose select Properties in the pop-up Men
  • B. Open the MMC and choose the Automatic Updates snap-i
  • C. Right click on your desktop and choose the automatic update
  • D. Go to the System applet in Control Panel and click on the Automatic Updates ico

Answer: D

NEW QUESTION 5
Which class of IDS events occur when the IDS fails to alert on malicious data?

  • A. True Negative
  • B. True Positive
  • C. False Positive
  • D. False Negative

Answer: D

NEW QUESTION 6
You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

  • A. killall httpd
  • B. endall httpd
  • C. kill httpd
  • D. end httpd

Answer: A

NEW QUESTION 7
If Linux server software is a requirement in your production environment which of the following should you NOT utilize?

  • A. Debian
  • B. Mandrake
  • C. Cygwin
  • D. Red Hat

Answer: C

NEW QUESTION 8
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to delete his private.txt file from his operating system. He knows that the deleted file can be recovered easily. Hence, he wants to delete the file securely. He wants to hide the shredding, and so he desires to add a final overwrite of the file private.txt with zero. Which of the following commands will John use to accomplish his task?

  • A. rmdir -v private.txt
  • B. shred -vfu private.txt
  • C. shred -vfuz private.txt
  • D. rm -vf private.txt

Answer: C

NEW QUESTION 9
Which of the following hardware devices prevents broadcasts from crossing over subnets?

  • A. Bridge
  • B. Hub
  • C. Router
  • D. Modem

Answer: C

NEW QUESTION 10
The Windows 'tracert' begins by sending what type of packet to the destination host?

  • A. A UDP packet with a TTL of 1
  • B. An ICMP Echo Request
  • C. An ICMP Router Discovery
  • D. An ICMP Echo Reply

Answer: A

NEW QUESTION 11
What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

  • A. SCHTASKS.EXE
  • B. SCHEDULETSKS.EXE
  • C. SCHEDULR.EXE
  • D. SCHRUN.EXE

Answer: A

NEW QUESTION 12
You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:
* they contain only numerals
* they contain only letters
* they contain only special characters
* they contain only letters and numerals
" they contain only letters and special characters
* they contain only numerals and special characters
Of the following, what is the benefit to using this set of tests?

  • A. They are focused on cracking passwords that use characters prohibited by the password policy
  • B. They find non-compliant passwords without cracking compliant password
  • C. They are focused on cracking passwords that meet minimum complexity requirements
  • D. They crack compliant and non-compliant passwords to determine whether the current policy is strong enough

Answer: B

NEW QUESTION 13
When a host on a remote network performs a DNS lookup of www.google.com, which of the following is likely to provide an Authoritative reply?

  • A. The local DNS server
  • B. The top-level DNS server for .com
  • C. The DNS server for google.com
  • D. The root DNS server

Answer: A

NEW QUESTION 14
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

  • A. Hardening
  • B. Authentication
  • C. Cryptography
  • D. Sanitization

Answer: A

NEW QUESTION 15
You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).
You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

  • A. Copy the files to a network share on an NTFS volum
  • B. Copy the files to a network share on a FAT32 volum
  • C. Place the files in an encrypted folde
  • D. Then, copy the folder to a floppy dis
  • E. Copy the files to a floppy disk that has been formatted using Windows 2000 Professiona

Answer: A

NEW QUESTION 16
An IT security manager is trying to quickly assess the risks associated with not implementing a corporate firewall system. What sort of risk assessment is most appropriate?

  • A. Annualized Risk Assessment
  • B. Qualitative risk assessment
  • C. Quantitative risk assessment
  • D. Technical Risk Assessment
  • E. Iterative Risk Assessment

Answer: B

NEW QUESTION 17
Who is responsible for deciding the appropriate classification level for data within an organization?

  • A. Data custodian
  • B. Security auditor
  • C. End user
  • D. Data owner

Answer: B

NEW QUESTION 18
Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?

  • A. Vulnerability scanner and auditing tool
  • B. Auditing tool and alerting system
  • C. Configuration management and alerting system
  • D. Security patching and vulnerability scanner

Answer: D

NEW QUESTION 19
What is the name of the registry key that is used to manage remote registry share permissions for the whole registry?

  • A. regkey
  • B. regmng
  • C. winreg
  • D. rrsreg

Answer: C

NEW QUESTION 20
......

P.S. Certshared now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.certshared.com/exam/GSEC/ (279 New Questions)