Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 11

Questions 101

Which of the below choices should an organization start with when implementing an effective risk management process?

Options:
A.

Implement an incident response plan

B.

Define security policy requirements

C.

Conduct periodic reviews

D.

Design controls and develop standards for each technology you plan to deploy

GIAC GSEC Premium Access
Questions 102

There are three key factors in selecting a biometric mechanism. What are they?

Options:
A.

Reliability, encryption strength, and cost

B.

Encryption strength, authorization method, and cost

C.

Reliability, user acceptance, and cost

D.

User acceptance, encryption strength, and cost

Questions 103

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

Options:
A.

NAT

B.

State Table

C.

Logging

D.

Content filtering

Questions 104

How are differences in configuration settings handled between Domain and Local Group Policy Objects (GPOs)?

Options:
A.

Local and Domain GPOs control different configuration settings, so there will not be conflicts.

B.

Settings in the domain-wide GPO override conflicting settings in the local GPO on each computer.

C.

Settings in the local GPO override conflicting settings when the domain-wide GPO is applied.

D.

Precedence depends on which GPO was updated first.

Questions 105

If an attacker compromised a host on a site's internal network and wanted to trick other machines into using that host as the default gateway, which type of attack would he use?

Options:
A.

MAC Flooding

B.

CDP Manipulation

C.

Telnet Attack

D.

DHCP Spoofing

E.

VLAN Hopping

Questions 106

Which of the following is an advantage of private circuits versus VPNs?

Options:
A.

Flexibility

B.

Performance guarantees

C.

Cost

D.

Time required to implement

Questions 107

The TTL can be found in which protocol header?

Options:
A.

It is found in byte 8 of the ICMP header.

B.

It is found in byte 8 of the IP header.

C.

It is found in byte 8 of the TCP header.

D.

It is found in byte 8 of the DNS header.

Questions 108

You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

Options:
A.

A firewall is blocking him.

B.

His laptop is incompatible.

C.

MAC filtering is blocking him.

D.

His operating system is incompatible.

Questions 109

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

Options:
A.

netstat -a | grep FTP

B.

FTP netstat -r

C.

FTP netstat -a

D.

netstat -r | grep FTP

Questions 110

What would the file permission example "rwsr-sr-x" translate to in absolute mode?

Options:
A.

1755

B.

6755

C.

6645

D.

1644