Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

Options:
A.

RARP

B.

ARP

C.

DNS

D.

RDNS

GIAC GSEC Premium Access
Questions 22

What is the key difference between Electronic Codebook mode and other block cipher modes like Cipher Block Chaining, Cipher-Feedback and Output-Feedback?

Options:
A.

Plaintext patterns are concealed by XO Ring with previous cipher text block but input to the block cipher is not randomized.

B.

Plaintext patterns are concealed and input to the block cipher is randomized by XO Ring with previous cipher text block.

C.

Plaintext patterns encrypted with the same key will always generate the same

Cipher text pattern

D.

Plaintext patterns are not concealed but input to the block cipher is randomized by XO Ring with previous cipher text block.

Questions 23

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:
A.

smbmount

B.

mount smb

C.

smbfsmount

D.

mount -t smbfs

Questions 24

What is the most secure way to address an unused Windows service so it cannot be exploited by malware?

Options:
A.

Firewall it

B.

Set to manual startup

C.

Disable it

D.

Uninstall it

Questions 25

Which of the following types of computers is used for attracting potential intruders?

Options:
A.

Files pot

B.

Honey pot

C.

Data pot

D.

Bastion host

Questions 26

What Amazon Web Services (AWS) term describes a grouping of at least one datacenter with redundant power, high speed connections to other data centres and the Internet?

Options:
A.

Management subnet

B.

Availability zone

C.

Region

D.

virtual private cloud

Questions 27

You are examining an IP packet with a header of 40 bytes in length and the value at byte 0 of the packet header is 6. Which of the following describes this packet?

Options:
A.

This is an IPv4 packet; the protocol encapsulated in the payload is unspecified.

B.

This is an IPv4 packet with a TCP payload.

C.

This is an IPv6 packet; the protocol encapsulated in the payload is unspecified.

D.

This is an IPv6 packet with a TCP payload.

Questions 28

A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?

Options:
A.

Power

B.

Smoke

C.

Natural Gas

D.

Water

E.

Toxins

Questions 29

You are doing some analysis of malware on a Unix computer in a closed test network. The IP address of the computer is 192.168.1.120. From a packet capture, you see the malware is attempting to do a DNS query for a server called iamabadserver.com so that it can connect to it. There is no DNS server on the test network to do name resolution. You have another computer, whose IP is 192.168.1.115, available on the test network that you would like for the malware connect to it instead. How do you get the malware to connect to that computer on the test network?

Options:
A.

You modify the HOSTS file on the computer you want the malware to connect to and add an entry that reads: 192.168.1.120 iamabadserver iamabadserver.com

B.

You modify the HOSTS file on the Unix computer your malware is running on and add an entry that reads: 192.168.1.115 iamabadserveriamabadserver.com

C.

You modify the HOSTS file on the Unix computer your malware is running on and add an entry that reads: 192.168.1.120 iamabadserver iamabadserver.com

D.

You modify the HOSTS file on the computer you want the malware to connect to and add an entry that reads: 192.168.1.115 iamabadserver iamabadserver.com

Questions 30

An attacker is able to trick an IDS into ignoring malicious traffic through obfuscation of the packet payload. What type of IDS error has occurred?

Options:
A.

True Negative

B.

True Positive

C.

False Positive

D.

False Negative