Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GSEC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSEC Premium Access

View all detail and faqs for the GSEC exam


746 Students Passed

89% Average Score

94% Same Questions
Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
Questions # 101:

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?

Options:

A.

mv $shell

B.

echo $shell

C.

rm $shell

D.

ls $shell

Questions # 102:

An organization keeps its intellectual property in a database. Protection of the data is assigned to one system administrator who marks the data, and monitors for this intellectual property leaving the network. Which defense-In-depth principle does this describe?

Options:

A.

Threat-Vector Analysis

B.

Protected Enclave

C.

Information Centric

D.

Uniform Protection

Questions # 103:

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. For testing purposes, you have configured a default IP-table with several filtering rules. You want to reconfigure the table. For this, you decide to remove the rules from all the chains in the table. Which of the following commands will you use?

Options:

A.

IPTABLES -D

B.

IPTABLES -A

C.

IPTABLES -h

D.

IPTABLES -F

Questions # 104:

When an IIS filename extension is mapped, what does this mean?

Options:

A.

Files with the mapped extensions cannot be interpreted by the web server.

B.

The file and all the data from the browser's request are handed off to the mapped interpreter.

C.

The files with the mapped extensions are interpreted by CMD.EXE.

D.

The files with the mapped extensions are interpreted by the web browser.

Questions # 105:

Which of the following access control principles helps prevent collusion and detect abuse of access?

Options:

A.

Least privilege

B.

Rotation of duties

C.

Separation of duties

D.

Need to know

Questions # 106:

Which of the following is used to allow or deny access to network resources?

Options:

A.

Spoofing

B.

ACL

C.

System hardening

D.

NFS

Questions # 107:

What must be added to VLANs to improve security?

Options:

A.

Network hubs

B.

Air gaps

C.

Spanning tree interfaces

D.

Access control lists

Questions # 108:

What is the term for the software that allows a single physical server to run multiple virtual servers?

Options:

A.

Virtual machine

B.

Hypervisor

C.

Host

D.

Guest

Questions # 109:

What does it mean if a protocol such as HTTP is stateless?

Options:

A.

The client responds to server request and keeps track of the conversation.

B.

If a stateless protocol is used it cannot be traced.

C.

It means it is unreliable.

D.

The server responds to a single request and then forgets about it.

Questions # 110:

There are three key factors in selecting a biometric mechanism. What are they?

Options:

A.

Reliability, encryption strength, and cost

B.

Encryption strength, authorization method, and cost

C.

Reliability, user acceptance, and cost

D.

User acceptance, encryption strength, and cost

Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.