Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following areas of a network contains DNS servers and Web servers for Internet users?

Options:
A.

VPN

B.

MMZ

C.

VLAN

D.

DMZ

GIAC GSEC Premium Access
Questions 52

Which of the following activities would take place during the containment phase?

Options:
A.

Disseminating change management documentation regarding the steps taken during incident.

B.

Rebuild a virtual server from scratch using the original installation media.

C.

Correlating logs from the firewall, PCAPs from an IPS, and syslogs from a server to

build a timeline.

D.

Creating a binary backup of the system's Infected hard drive for usage in a forensic

Investigation.

Questions 53

Which of the following is a benefit of using John the Ripper for auditing passwords?

Options:
A.

John's Blowfish cracking routine uses a complex central computing loop that increases the cost of each hash computation.

B.

John the Ripper is much slower for auditing passwords encrypted with MD5 and Blowfish.

C.

John's MD5 cracking routine uses a simplified central computing loop that decreases the cost of each hash computation.

D.

John cannot use the DES bit-slicing technique, so it is much slower than other tools, especially when used against DES-encrypted passwords.

Questions 54

What dots Office 365 use natively for authentication?

Options:
A.

Microsoft CHAP

B.

Exchange Online

C.

Azure Active Directory

D.

Central Authentication Service

E.

Extensible Authentication Protocol

Questions 55

What is the name of the command-line tool for Windows that can be used to manage audit policies on remote systems?

Options:
A.

SECEDTT.EXE

B.

POLCLI.EXE

C.

REMOTEAUDIT.EXE

D.

AUDITPOL.EXE

Questions 56

Which of the following is a Layer 3 device that will typically drop directed broadcast traffic?

Options:
A.

Hubs

B.

Bridges

C.

Routers

D.

Switches

Questions 57

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:
A.

Snort

B.

Apache

C.

SSH

D.

SUDO

Questions 58

Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?

Options:
A.

Vulnerability scanner and auditing tool

B.

Auditing tool and alerting system

C.

Configuration management and alerting system

D.

Security patching and vulnerability scanner

Questions 59

Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?

Options:
A.

Detective

B.

Preventive

C.

Responsive

D.

Corrective

Questions 60

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Host-based intrusion detection system (HIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Server-based intrusion detection system (SIDS)

D.

Network intrusion detection system (NIDS)