Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GSEC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSEC Premium Access

View all detail and faqs for the GSEC exam


746 Students Passed

89% Average Score

94% Same Questions
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

An employee is currently logged into the corporate web server, without permission. You log into the web server as 'admin" and look for the employee's username: "dmaul" using the "who" command. This is what you get back:

Question # 31

Options:

A.

The contents of the /var/log/messages file has been altered

B.

The contents of the bash history file has been altered

C.

The contents of the utmp file has been altered

D.

The contents of the http logs have been altered

Questions # 32:

Which of the following works at the network layer and hides the local area network IP address and topology?

Options:

A.

Network address translation (NAT)

B.

Hub

C.

MAC address

D.

Network interface card (NIC)

Questions # 33:

What is the key difference between Electronic Codebook mode and other block cipher modes like Cipher Block Chaining, Cipher-Feedback and Output-Feedback?

Options:

A.

Plaintext patterns are concealed by XO Ring with previous cipher text block but input to the block cipher is not randomized.

B.

Plaintext patterns are concealed and input to the block cipher is randomized by XO Ring with previous cipher text block.

C.

Plaintext patterns encrypted with the same key will always generate the same

Cipher text pattern

D.

Plaintext patterns are not concealed but input to the block cipher is randomized by XO Ring with previous cipher text block.

Questions # 34:

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

RealSecure

B.

Snort

C.

StealthWatch

D.

Tripwire

Questions # 35:

How is confidentiality disabled in the IPSec Encapsulated Security Payload protocol?

Options:

A.

Selecting no algorithm for encryption or authentication

B.

Selecting the NULL authentication algorithm

C.

Selecting both NULL algorithms

D.

Selecting the NULL encryption algorithm

Questions # 36:

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Privacy policy

B.

Backup policy

C.

User password policy

D.

Network security policy

Questions # 37:

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Questions # 38:

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They allow an attacker to conduct a buffer overflow.

B.

They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

C.

They allow an attacker to replace utility programs that can be used to detect the attacker's activity.

D.

They allow an attacker to run packet sniffers secretly to capture passwords.

Questions # 39:

What is it called when an OSI layer adds a new header to a packet?

Options:

A.

Switching

B.

Encapsulation

C.

fragmentation

D.

Routing

Questions # 40:

What is the main problem with relying solely on firewalls to protect your company's sensitive data?

Options:

A.

Their value is limited unless a full-featured Intrusion Detection System is used.

B.

Their value is limited because they cannot be changed once they are configured.

C.

Their value is limited because operating systems are now automatically patched.

D.

Their value is limited because they can be bypassed by technical and non-technical means.

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.