Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 4

Questions 31

What protocol is a WAN technology?

Options:
A.

802.11

B.

802.3

C.

Ethernet

D.

Frame Relay

GIAC GSEC Premium Access
Questions 32

The process of enumerating all hosts on a network defines which of the following activities?

Options:
A.

Port scanning

B.

Vulnerability scanning

C.

GPS mapping

D.

Network mapping

Questions 33

Which of the following features of Windows 7 allows an administrator to both passively review installed software and configure policies to prevent out-of-date or insecure software from running?

Options:
A.

Direct Access

B.

Software Restriction Policies

C.

App Locker

D.

User Account Control

Questions 34

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring an application server. An application named Report, which is owned by the root user, is placed on the server. This application requires superuser permission to write to other files. All sales managers of the company will be using the application. Which of the following steps will you take in order to enable the sales managers to run and use the Report application?

Options:
A.

Change the Report application to a SUID command.

B.

Make the user accounts of all the sales managers the members of the root group.

C.

Provide password of root user to all the sales managers.

Ask each sales manager to run the application as the root user.

D.

As the application is owned by the root, no changes are required.

Questions 35

Which of the following systems acts as a NAT device when utilizing VMware in NAT mode?

Options:
A.

Guest system

B.

Local gateway

C.

Host system

D.

Virtual system

Questions 36

Which of the following books deals with confidentiality?

Options:
A.

Purple Book

B.

Orange Book

C.

Red Book

D.

Brown Book

Questions 37

What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?

Options:
A.

Risk of system crashes and security alerts.

B.

Risk of deletion of backup files.

C.

Risk of modified application configuration files.

D.

Risk of applying untested patches.

Questions 38

A program has allocated 10 characters of space for user’s response on a form. The application does not validate the number of characters that a user can input into the field before accepting the data. Which type of attack Is the application vulnerable to?

Options:
A.

On hijacking

B.

Buffet overflow

C.

Cross site scripting

D.

SQL Injection

Questions 39

How does a default deny rule in a firewall prevent unknown attacks?

Options:
A.

Slops users from clicking on known bad URIs.

B.

Forbids outbound access with unknown payload.

C.

Blocks packets that are not explicitly allowed.

D.

Refuses packets that match a defined set of rules

Questions 40

Which of the following commands is used to change file access permissions in Linux?

Options:
A.

chgrp

B.

chperm

C.

chmod

D.

chown