★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GSEC Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/GSEC-dumps.html


100% Guarantee of GSEC test materials and latest exam for GIAC certification for IT examinee, Real Success Guaranteed with Updated GSEC pdf dumps vce Materials. 100% PASS GIAC Security Essentials Certification exam Today!

Check GSEC free dumps before getting the full version:

NEW QUESTION 1
Which of the following types of computers is used for attracting potential intruders?

  • A. Files pot
  • B. Honey pot
  • C. Data pot
  • D. Bastion host

Answer: B

NEW QUESTION 2
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.

  • A. They allow an attacker to conduct a buffer overflo
  • B. They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime acces
  • C. They allow an attacker to replace utility programs that can be used to detect the attacker's activit
  • D. They allow an attacker to run packet sniffers secretly to capture password

Answer: BCD

NEW QUESTION 3
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

  • A. Halon
  • B. CO2
  • C. Soda acid
  • D. Water

Answer: ABC

NEW QUESTION 4
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

  • A. RARP
  • B. ARP
  • C. DNS
  • D. RDNS

Answer: A

NEW QUESTION 5
You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company's business systems?

  • A. It may harm otherwise healthy system
  • B. It may produce false negative result
  • C. It may generate false positive result
  • D. It may not return enough benefit for the cos

Answer: C

NEW QUESTION 6
What is the maximum number of connections a normal Bluetooth device can handle at one time?

  • A. 2
  • B. 4
  • C. 1
  • D. 8
  • E. 7

Answer: E

NEW QUESTION 7
What is a security feature available with Windows Vista and Windows 7 that was not
present in previous Windows operating systems?

  • A. Data Execution Prevention (DEP)
  • B. User Account Control (UAC)
  • C. Encrypting File System (EFS)
  • D. Built-in IPSec Client

Answer: B

NEW QUESTION 8
Many IIS servers connect to Microsoft SQL databases. Which of the following statements about SQL server security is TRUE?

  • A. SQL Server patches are part of the operating system patche
  • B. SQL Server should be installed on the same box as your IIS web server when they communicate as part of the web applicatio
  • C. It is good practice to never use integrated Windows authentication for SQL Serve
  • D. It is good practice to not allow users to send raw SQL commands to the SQL Serve

Answer: D

NEW QUESTION 9
Which of the following is an Implementation of PKI?

  • A. SSL
  • B. 3DES
  • C. Kerberos
  • D. SHA-1

Answer: A

NEW QUESTION 10
Which of the following areas of a network contains DNS servers and Web servers for Internet users?

  • A. VPN
  • B. MMZ
  • C. VLAN
  • D. DMZ

Answer: D

NEW QUESTION 11
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

  • A. killall
  • B. ps
  • C. getpid
  • D. kill

Answer: B

NEW QUESTION 12
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

  • A. PPTP
  • B. IPSec
  • C. PGP
  • D. NTFS

Answer: C

NEW QUESTION 13
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?

  • A. The packets are probably corrupte
  • B. The packets may have been accidentally routed onto the Interne
  • C. The packets may be deliberately spoofed by an attacke
  • D. The packets are a sign of excess fragmentatio
  • E. A and B
  • F. B and C
  • G. B and D
  • H. A and D

Answer: B

NEW QUESTION 14
Which of the following quantifies the effects of a potential disaster over a period of time?

  • A. Risk Assessment
  • B. Business Impact Analysis
  • C. Disaster Recovery Planning
  • D. Lessons Learned

Answer: B

NEW QUESTION 15
Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode?

  • A. Length
  • B. Source IP
  • C. TTL
  • D. Destination IP

Answer: C

NEW QUESTION 16
A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?

  • A. Power
  • B. Smoke
  • C. Natural Gas
  • D. Water
  • E. Toxins

Answer: B

NEW QUESTION 17
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.

  • A. SSL
  • B. HTTP
  • C. TLS
  • D. SNMP

Answer: AC

NEW QUESTION 18
Which of the following is an UDP based protocol?

  • A. telnet
  • B. SNMP
  • C. IMAP
  • D. LDAP

Answer: B

NEW QUESTION 19
Which of the following statements best describes where a border router is normally placed?

  • A. Between your firewall and your internal network
  • B. Between your firewall and DNS server
  • C. Between your ISP and DNS server
  • D. Between your ISP and your external firewall

Answer: D

NEW QUESTION 20
......

P.S. Dumpscollection.com now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.dumpscollection.net/dumps/GSEC/ (279 New Questions)