★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW GSEC Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/GSEC-dumps.html
100% Guarantee of GSEC test materials and latest exam for GIAC certification for IT examinee, Real Success Guaranteed with Updated GSEC pdf dumps vce Materials. 100% PASS GIAC Security Essentials Certification exam Today!
Check GSEC free dumps before getting the full version:
NEW QUESTION 1
Which of the following types of computers is used for attracting potential intruders?
- A. Files pot
- B. Honey pot
- C. Data pot
- D. Bastion host
Answer: B
NEW QUESTION 2
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.
- A. They allow an attacker to conduct a buffer overflo
- B. They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime acces
- C. They allow an attacker to replace utility programs that can be used to detect the attacker's activit
- D. They allow an attacker to run packet sniffers secretly to capture password
Answer: BCD
NEW QUESTION 3
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.
- A. Halon
- B. CO2
- C. Soda acid
- D. Water
Answer: ABC
NEW QUESTION 4
Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?
- A. RARP
- B. ARP
- C. DNS
- D. RDNS
Answer: A
NEW QUESTION 5
You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company's business systems?
- A. It may harm otherwise healthy system
- B. It may produce false negative result
- C. It may generate false positive result
- D. It may not return enough benefit for the cos
Answer: C
NEW QUESTION 6
What is the maximum number of connections a normal Bluetooth device can handle at one time?
- A. 2
- B. 4
- C. 1
- D. 8
- E. 7
Answer: E
NEW QUESTION 7
What is a security feature available with Windows Vista and Windows 7 that was not
present in previous Windows operating systems?
- A. Data Execution Prevention (DEP)
- B. User Account Control (UAC)
- C. Encrypting File System (EFS)
- D. Built-in IPSec Client
Answer: B
NEW QUESTION 8
Many IIS servers connect to Microsoft SQL databases. Which of the following statements about SQL server security is TRUE?
- A. SQL Server patches are part of the operating system patche
- B. SQL Server should be installed on the same box as your IIS web server when they communicate as part of the web applicatio
- C. It is good practice to never use integrated Windows authentication for SQL Serve
- D. It is good practice to not allow users to send raw SQL commands to the SQL Serve
Answer: D
NEW QUESTION 9
Which of the following is an Implementation of PKI?
- A. SSL
- B. 3DES
- C. Kerberos
- D. SHA-1
Answer: A
NEW QUESTION 10
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
- A. VPN
- B. MMZ
- C. VLAN
- D. DMZ
Answer: D
NEW QUESTION 11
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
- A. killall
- B. ps
- C. getpid
- D. kill
Answer: B
NEW QUESTION 12
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?
- A. PPTP
- B. IPSec
- C. PGP
- D. NTFS
Answer: C
NEW QUESTION 13
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?
- A. The packets are probably corrupte
- B. The packets may have been accidentally routed onto the Interne
- C. The packets may be deliberately spoofed by an attacke
- D. The packets are a sign of excess fragmentatio
- E. A and B
- F. B and C
- G. B and D
- H. A and D
Answer: B
NEW QUESTION 14
Which of the following quantifies the effects of a potential disaster over a period of time?
- A. Risk Assessment
- B. Business Impact Analysis
- C. Disaster Recovery Planning
- D. Lessons Learned
Answer: B
NEW QUESTION 15
Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode?
- A. Length
- B. Source IP
- C. TTL
- D. Destination IP
Answer: C
NEW QUESTION 16
A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?
- A. Power
- B. Smoke
- C. Natural Gas
- D. Water
- E. Toxins
Answer: B
NEW QUESTION 17
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
- A. SSL
- B. HTTP
- C. TLS
- D. SNMP
Answer: AC
NEW QUESTION 18
Which of the following is an UDP based protocol?
- A. telnet
- B. SNMP
- C. IMAP
- D. LDAP
Answer: B
NEW QUESTION 19
Which of the following statements best describes where a border router is normally placed?
- A. Between your firewall and your internal network
- B. Between your firewall and DNS server
- C. Between your ISP and DNS server
- D. Between your ISP and your external firewall
Answer: D
NEW QUESTION 20
......
P.S. Dumpscollection.com now are offering 100% pass ensure GSEC dumps! All GSEC exam questions have been updated with correct answers: https://www.dumpscollection.net/dumps/GSEC/ (279 New Questions)