Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers

Questions 1

How is confidentiality disabled in the IPSec Encapsulated Security Payload protocol?

Options:
A.

Selecting no algorithm for encryption or authentication

B.

Selecting the NULL authentication algorithm

C.

Selecting both NULL algorithms

D.

Selecting the NULL encryption algorithm

GIAC GSEC Premium Access
Questions 2

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

Options:
A.

The laptop users will be able to use smart cards for getting authenticated.

B.

Both tasks will be accomplished.

C.

None of the tasks will be accomplished.

D.

The wireless network communication will be secured.

Questions 3

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

usermod -s

B.

chage

C.

usermod -u

D.

useradd -s

Questions 4

Which of the following processes is known as sanitization?

Options:
A.

Assessing the risk involved in discarding particular information.

B.

Verifying the identity of a person, network host, or system process.

C.

Physically destroying the media and the information stored on it.

D.

Removing the content from the media so that it is difficult to restore.

Questions 5

What security practice is described by NIST as the application of science to the identification, collection, examination, and analysis of data while maintaining data integrity and chain of custody?

Options:
A.

Digital forensics

B.

Vulnerability Assessments

C.

Penetration Tests

D.

Incident Response

Questions 6

Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?

Hints

• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory /home /giac /PasswordHashing/

• Run Hashcat in straight mode (flag -a 0) to crack the MD5 hashes (flag -m 500) In the shadow file.

• Use the hash values from the Hashcat output file and the shadow file to match the cracked password with the user name.

• If required, a backup copy of the original files can be found in the shadowbackup directory.

GSEC Question 6

GSEC Question 6

Options:
A.

52345234

B.

YOuRF ether?

C.

symbiote

D.

Volcano

E.

QX689PJ688

F.

LlqMM@qe

G.

Noregrets2

Questions 7

Which of the following protocols work at the Session layer of the OSI model? Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Border Gateway Multicast Protocol (BGMP)

B.

Internet Security Association and Key Management Protocol (ISAKMP)

C.

Trivial File Transfer Protocol (TFTP)

D.

User Datagram Protocol (UDP)

Questions 8

The Windows 'tracert' begins by sending what type of packet to the destination host?

Options:
A.

A UDP packet with a TTL of 1

B.

An ICMP Echo Request

C.

An ICMP Router Discovery

D.

An ICMP Echo Reply

Questions 9

Which of the following is an advantage of an Intrusion Detection System?

Options:
A.

It is a mature technology.

B.

It is the best network security.

C.

It never needs patching.

D.

It is a firewall replacement.

Questions 10

Which of the following are examples of Issue-Specific policies all organizations should address?

Options:
A.

Perimeter filtering guides, break times for employees, desktop neatness and backup procedures.

B.

Rogue wireless access points, auditing, break time for employees and organizational structure.

C.

Audit logs, physical access, mission statements and network protocols used.

D.

Backup requirements, employee monitoring, physical access and acceptable use.