Free Certification Practice Questions

GIAC-GSEC

Loading…
Which of the following statements would describe the term "incident" when used in the branch of security known as Incident Handling?
#31
Which of the following would be a valid reason to use a Windows workgroup?
#32
Which of the following is a characteristic of hash operations?
#33
When you log into your Windows desktop what information does your Security Access Token (SAT) contain?
#34
What is the discipline of establishing a known baseline and managing that condition known as?
#35
Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?
#36
Who is responsible for deciding the appropriate classification level for data within an organization?
#37
Analyze the screenshot below. What is the purpose of this message?
#38
Which of the following Linux commands can change both the username and group name a file belongs to?
#39
What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?
#40
Which command would allow an administrator to determine if a RPM package was already installed?
#41
When are Group Policy Objects (GPOs) NOT applied automatically to workstations?
#42
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?
#43
The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?
#44
Which of the following attack vectors are addressed by Xinetd and TCP Wrappers?
#45
Why are false positives such a problem with IPS technology?
#46
What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?
#47
While using Wire shark to investigate complaints of users being unable to login to a web application, you come across an HTTP POST submitted through your web application. The contents of the POST are listed below. Based on what you see below, which of the following would you recommend to prevent future damage to your database?
#48
It is possible to sniff traffic from other hosts on a switched Ethernet network by impersonating which type of network device?
#49
You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?
#50
Which of the following radio frequencies is used by the IEEE 802.11a wireless network?
#51
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain- based network. The network contains ten Windows 2003 member servers, 150 Windows XP Professional client computers. According to the company's security policy, Mark needs to check whether all the computers in the network have all available security updates and shared folders. He also needs to check the file system type on each computer's hard disk. Mark installs and runs MBSACLI.EXE with the appropriate switches on a server. Which of the following tasks will he accomplish?
#52
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
#53
You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a WindowsActive Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:The wireless network communication should be secured.The laptop users should be able to use smart cards for getting authenticated.In order to accomplish the tasks, you take the following steps:Configure 802.1x and WEP for the wireless connections.Configure the PEAP-MS-CHAP v2 protocol for authentication.What will happen after you have taken these steps?
#54