Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 10

Questions 91

Which of the following defines the communication link between a Web server and Web applications?

Options:
A.

CGI

B.

PGP

C.

Firewall

D.

IETF

GIAC GSEC Premium Access
Questions 92

Which of the following attacks can be mitigated by avoiding making system calls from within a web application?

Options:
A.

Denial of Service

B.

OS command injection

C.

SQL Injection

D.

Buffer Overflows

Questions 93

The Linux command to make the /etc/shadow file, already owned by root, readable only by root is which of the following?

Options:
A.

chmod 444/etc/shadow

B.

chown root: root/etc/shadow

C.

chmod 400/etc/shadow

D.

chown 400 /etc/shadow

Questions 94

Which of the following terms refers to the process in which headers and trailers are added around user data?

Options:
A.

Encapsulation

B.

Authentication

C.

Authorization

D.

Encryption

Questions 95

Use nmap to discover a host on the 10.10.10.0/24 network, scanning only port 8082 and using the SYN or Stealth scan approach. Which host has a service called -blackice-alerts"?

GSEC Question 95

GSEC Question 95

Options:
A.

10.10.10.115

B.

10.10.10.80

C.

10.10.10.5

D.

10.10.10

E.

10.10.10.30

F.

10.10.10.164

G.

10.10.10.37

Questions 96

When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?

Options:
A.

The packets are probably corrupted.

B.

The packets may have been accidentally routed onto the Internet.

C.

The packets may be deliberately spoofed by an attacker.

D.

The packets are a sign of excess fragmentation.

E.

A and B

F.

B and C

G.

B and D

Questions 97

Where are user accounts and passwords stored in a decentralized privilege management environment?

Options:
A.

On a central authentication server.

B.

On more than one server.

C.

On each server.

D.

On a server configured for decentralized privilege management.

Questions 98

A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it's in use. What feature of HIPS is being described in this scenario?

Options:
A.

Signature Matching

B.

Application Behavior Monitoring

C.

Host Based Sniffing

D.

Application Action Modeling

Questions 99

What is needed for any of the four options for Azure AD multi-factor user authentication?

Options:
A.

Fingerprint reader

B.

Web cam

C.

Phone

D.

Iris scan

Questions 100

Which of the following is generally practiced by the police or any other recognized governmental authority?

Options:
A.

Spoofing

B.

SMB signing

C.

Wiretapping

D.

Phishing