Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GSEC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSEC Premium Access

View all detail and faqs for the GSEC exam


746 Students Passed

89% Average Score

94% Same Questions
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

The Windows 'tracert' begins by sending what type of packet to the destination host?

Options:

A.

A UDP packet with a TTL of 1

B.

An ICMP Echo Request

C.

An ICMP Router Discovery

D.

An ICMP Echo Reply

Questions # 12:

Your system has been infected by malware. Upon investigation, you discover that the malware propagated primarily via email. The malware attacked known vulnerabilities for which patches are available, but due to problems with your configuration management system you have no way to know which systems have been patched and which haven't, slowing your progress in patching your network. Of the following, which solution would you use to protect against this propagation vector?

Options:

A.

Encrypt the emails on the server

B.

Scan and block suspect email attachments at the email server

C.

Install a firewall between the email server and the Internet

D.

Separate the email server from the trusted portions of the network

Questions # 13:

Which of the following networking topologies uses a hub to connect computers?

Options:

A.

Bus

B.

Ring

C.

Star

D.

Cycle

Questions # 14:

Which of the following is required to be backed up on a domain controller to recover Active Directory?

Options:

A.

System state data

B.

Operating System files

C.

User's personal data

D.

Installed third party application's folders

Questions # 15:

What technique makes it difficult for attackers to predict the memory address space location for code execution?

Options:

A.

Security Cookies

B.

DFP

C.

SLMOP

D.

ASLR

E.

Stack Canaries

Questions # 16:

Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?

Options:

A.

Detective

B.

Preventive

C.

Responsive

D.

Corrective

Questions # 17:

You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

Options:

A.

killall httpd

B.

endall httpd

C.

kill httpd

D.

end httpd

Questions # 18:

What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

Options:

A.

Camera Recordings

B.

Security guards

C.

Encryption

D.

Shredding

E.

Corrective Controls

Questions # 19:

An application developer would like to replace Triple DES in their software with a stronger algorithm of the same type. Which of the following should they use?

Options:

A.

RC5

B.

AES

C.

RSA

D.

SHA

Questions # 20:

Which of the following tools is also capable of static packet filtering?

Options:

A.

netstat.exe

B.

ipsecpol.exe

C.

ipconfig.exe

D.

net.exe

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.