getcertified4sure.com

The Abreast Of The Times Guide To GSEC Answers




Ucertify offers free demo for GSEC exam. "GIAC Security Essentials Certification", also known as GSEC exam, is a GIAC Certification. This set of posts, Passing the GIAC GSEC exam, will help you answer those questions. The GSEC Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GSEC exams and revised by experts!

Check GSEC free dumps before getting the full version:

NEW QUESTION 1
Which of the following TCP packet flags indicates that host should IMMEDIATELY terminate the connection containing the packet?

  • A. FIN
  • B. URG
  • C. SYN
  • D. RST

Answer: D

NEW QUESTION 2
What is the most secure way to address an unused Windows service so it cannot be exploited by malware?

  • A. Firewall it
  • B. Set to manual startup
  • C. Disable it
  • D. Uninstall it

Answer: D

NEW QUESTION 3
The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?

  • A. The apt-get upgrade command doesn't work with the cron command because of incompatibility
  • B. Relying on vendor and 3rd party email lists enables updates via email, for even faster patching
  • C. Automated patching of production servers without prior testing may result in unexpected behavior or failures
  • D. The command apt-get upgrade is incorrect, you need to run the apt-get update command

Answer: D

NEW QUESTION 4
Which of the following protocols work at the Session layer of the OSI model? Each correct
answer represents a complete solution. Choose all that apply.

  • A. Border Gateway Multicast Protocol (BGMP)
  • B. Internet Security Association and Key Management Protocol (ISAKMP)
  • C. Trivial File Transfer Protocol (TFTP)
  • D. User Datagram Protocol (UDP)

Answer: AB

NEW QUESTION 5
Which of the following languages enable programmers to store cookies on client computers? Each correct answer represents a complete solution. Choose two.

  • A. DHTML
  • B. Perl
  • C. HTML
  • D. JavaScript

Answer: BD

NEW QUESTION 6
What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?

  • A. Decode the message by decrypting the asymmetric key with his private key, then using the asymmetric key to decrypt the messag
  • B. Decode the message by decrypting the symmetric key with his private key, then using the symmetric key to decrypt the messag
  • C. Decode the message by decrypting the symmetric key with his public key, then using the symmetric key to decrypt the messag
  • D. Decrypt the message by encrypting the digital signature with his private key, then using the digital signature to decrypt the messag

Answer: A

NEW QUESTION 7
Why are false positives such a problem with IPS technology?

  • A. File integrity is not guarantee
  • B. Malicious code can get into the networ
  • C. Legitimate services are not delivere
  • D. Rules are often misinterprete

Answer: D

NEW QUESTION 8
Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

  • A. The server is not using a well-known por
  • B. The server is on a different networ
  • C. The client-side source ports are differen
  • D. The clients are on different subnet

Answer: C

NEW QUESTION 9
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

  • A. A firewall is blocking hi
  • B. His laptop is incompatibl
  • C. MAC filtering is blocking hi
  • D. His operating system is incompatibl

Answer: C

NEW QUESTION 10
Which of the following is a standard Unix command that would most likely be used to copy raw file system data for later forensic analysis?

  • A. dd
  • B. backup
  • C. cp
  • D. gzip

Answer: A

NEW QUESTION 11
Which of the following is more commonly used for establishing high-speed backbones that interconnect smaller networks and can carry signals over significant distances?

  • A. Bluetooth
  • B. Ethernet
  • C. Token ring
  • D. Asynchronous Transfer Mode (ATM)

Answer: D

NEW QUESTION 12
Which port category does the port 110 fall into?

  • A. Well known port
  • B. Dynamic port
  • C. Private port
  • D. Application port

Answer: A

NEW QUESTION 13
Which of the following is a new Windows Server 2008 feature for the Remote Desktop Protocol (RDP)?

  • A. The ability to allow the administrator to choose a port other than the default RDP port (TCP 3389)
  • B. The ability to support connections from mobile devices like smart phones
  • C. The ability to allow clients to authenticate over TLS
  • D. The ability to allow clients to execute individual applications rather than using a terminal desktop

Answer: D

NEW QUESTION 14
Which of the following books deals with confidentiality?

  • A. Purple Book
  • B. Orange Book
  • C. Red Book
  • D. Brown Book

Answer: B

NEW QUESTION 15
Which of the following are examples of Issue-Specific policies all organizations should address?

  • A. Perimeter filtering guides, break times for employees, desktop neatness and backup procedure
  • B. Rogue wireless access points, auditing, break time for employees and organizational structur
  • C. Audit logs, physical access, mission statements and network protocols use
  • D. Backup requirements, employee monitoring, physical access and acceptable us

Answer: D

NEW QUESTION 16
......

100% Valid and Newest Version GSEC Questions & Answers shared by 2passeasy, Get Full Dumps HERE: https://www.2passeasy.com/dumps/GSEC/ (New 279 Q&As)