Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 7

Questions 61

Why would someone use port 80 for deployment of unauthorized services?

Options:
A.

Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue service.

B.

If someone were to randomly browse to the rogue port 80 service they could be compromised.

C.

This is a technique commonly used to perform a denial of service on the local web server.

D.

HTTP traffic is usually allowed outbound to port 80 through the firewall in most environments.

GIAC GSEC Premium Access
Questions 62

Which Host-based IDS (HIDS) method of log monitoring utilizes a list of keywords or phrases that define the events of interest for the analyst, then takes a list of keywords to watch for and generates alerts when it sees matches in log file activity?

Options:
A.

Passive analysis

B.

Retroactive analysis

C.

Exclusive analysis

D.

Inclusive analysis

Questions 63

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

Options:
A.

The Security ID numbers (SIDs) of all the groups to which you belong

B.

A list of cached authentications

C.

A list of your domain privileges

D.

The Security ID numbers (SIDs) of all authenticated local users

Questions 64

What must be added to VLANs to improve security?

Options:
A.

Network hubs

B.

Air gaps

C.

Spanning tree interfaces

D.

Access control lists

Questions 65

What is a forensic examiner confirming when they create a cryptographic hash, such asMD5 or SHA1, of a file?

Options:
A.

Authentication

B.

Integrity

C.

Confidentiality

D.

Authorization

Questions 66

Jonny Is an IT Project Manager. He cannot access the folder called "IT Projects" but can access a folder called "Sales Data" even though he's not on the sales team. Which information security principle has failed?

Options:
A.

Authentication

B.

Authorization

C.

Identification

D.

Accountability

Questions 67

What type of formal document would include the following statement?

Employees are responsible for exercising good judgment regarding the reasonableness of personal use. Individual departments are responsible for creating guidelines concerning personal application of Internet/Intranet/Extranet systems. In the absence of such policies, employees should be guided by departmental policies, and if there is any uncertainty, employees should consult their supervisor or manager.

Options:
A.

Company privacy statement

B.

Remote access policy

C.

Acceptable use policy

D.

Non-disclosure agreement

Questions 68

A folder D:\Files\Marketing has the following NTFS permissions:

• Administrators: Full Control

• Marketing: Change and Authenticated

• Users: Read

It has been shared on the server as "MARKETING", with the following share permissions:

• Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

Options:
A.

No access

B.

Full Control

C.

Read

D.

Change

Questions 69

What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?

Options:
A.

Decode the message by decrypting the asymmetric key with his private key, then using the asymmetric key to decrypt the message.

B.

Decode the message by decrypting the symmetric key with his private key, then using the symmetric key to decrypt the message.

C.

Decode the message by decrypting the symmetric key with his public key, then using the symmetric key to decrypt the message.

D.

Decrypt the message by encrypting the digital signature with his private key, then using the digital signature to decrypt the message.

Questions 70

The following three steps belong to the chain of custody for federal rules of evidence. What additional step is recommended between steps 2 and 3?

STEP 1 - Take notes: who, what, where, when and record serial numbers of machine(s) in question.

STEP 2 - Do a binary backup if data is being collected.

STEP 3 - Deliver collected evidence to law enforcement officials.

Options:
A.

Rebuild the original hard drive from scratch, and sign and seal the good backup in a plastic bag.

B.

Conduct a forensic analysis of all evidence collected BEFORE starting the chain of custody.

C.

Take photographs of all persons who have had access to the computer.

D.

Check the backup integrity using a checksum utility like MD5, and sign and seal each piece of collected evidence in a plastic bag.