Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 8

Questions 71

In a /24 subnet, which of the following is a valid broadcast address?

Options:
A.

200.11.11.1

B.

221.10.10.10

C.

245.20.30.254

D.

192.10.10.255

GIAC GSEC Premium Access
Questions 72

You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network?

Options:
A.

APIPA

B.

LMHOSTS

C.

DNS

D.

DHCP

E.

WINS

Questions 73

Which of the following is the key point to consider in the recovery phase of incident handling?

Which of the following is the key point to consider in the recovery phase of incident handling?

Options:
A.

Isolating the source of the compromise

B.

Shutting down the system

C.

Ensuring that vulnerable code is not being restored

D.

Preparing the jump bag

Questions 74

Which Linux file lists every process that starts at boot time?

Options:
A.

inetd

B.

netsrv

C.

initd

D.

inittab

Questions 75

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

NTFS gives better file security than FAT16 and FAT32.

B.

Automatic backup.

C.

NTFS file system supports for larger hard disks.

D.

NTFS give improved disk compression than FAT16 and FAT32.

Questions 76

You are examining a packet capture session in Wire shark and see the packet shown in the accompanying image. Based on what you see, what is the appropriate protection against this type of attempted attack?

GSEC Question 76

Options:
A.

Block DNS traffic across the router

B.

Disable forwarding of unsolicited TCP requests

C.

Disable IP-directed broadcast requests

D.

Block UDP packets at the firewall

Questions 77

You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?

Options:
A.

The password of the root user cannot be changed.

B.

Use the PASSWD root command.

Reboot the computer.

C.

Reboot the computer in run level 0. Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

D.

Reboot the computer in run level 1.

Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

Questions 78

Which of the following statements about the authentication concept of information security management is true?

Options:
A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

Questions 79

When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?

Options:
A.

TCP Sequence Number

B.

Source address

C.

Destination port

D.

Destination address

Questions 80

Which logging capability is provided natively by syslog?

Options:
A.

Secure transit

B.

Collection

C.

MuIti-platform alerting

D.

Secure centralization