Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSEC Practice Exam with Questions & Answers | Set: 9

Questions 81

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You have created a folder named Report. You have made David the owner of the folder. The members of a group named JAdmin can access the folder and have Read, Write, and Execute permissions. No other user can access the folder. You want to ensure that the members of the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder.

Which of the following commands will you use to accomplish the task?

Options:
A.

chmod 777 report

B.

chown david.jadmin report

C.

chmod 555 report

D.

chmod 754 report

GIAC GSEC Premium Access
Questions 82

Which of the following choices accurately describes how PGP works when encrypting email?

Options:
A.

PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric key.

B.

PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

C.

PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

D.

PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric key.

Questions 83

An application developer would like to replace Triple DES in their software with a stronger algorithm of the same type. Which of the following should they use?

Options:
A.

RC5

B.

AES

C.

RSA

D.

SHA

Questions 84

Which of the following applications would be BEST implemented with UDP instead of TCP?

Options:
A.

A multicast streaming application.

B.

A web browser.

C.

A DNS zone transfer.

D.

A file transfer application.

Questions 85

Use Wireshark to analyze Desktop;PCAP FILES/charile.pcap

What is the destination IP address in packet #3?

GSEC Question 85

GSEC Question 85

Options:
A.

192.168.184.2

B.

192.168.184.73

C.

192.168.184.129

D.

192.168.184.111

E.

197.168.184.13

F.

197.168.184.158

G.

192.168.184.201

Questions 86

What is a characteristic of iOS security?

Options:
A.

Most security features are user configurable

B.

Less restrictive architecture than macOS

C.

Flaw disclosures are sent to the Open Handset Alliance (OHA)

D.

Forbids mobile operator (MO) software

Questions 87

When should you create the initial database for a Linux file integrity checker?

Options:
A.

Before a system is patched

B.

After a system has been compromised

C.

Before a system has been compromised

D.

During an attack

Questions 88

What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

Options:
A.

These attacks work against relatively idle servers.

B.

These attacks rely on a modified TCP/IP stack to function.

C.

These attacks can be easily traced back to the source.

D.

These attacks only work against Linux/Unix hosts.

Questions 89

What is the first thing that should be done during the containment step of incident handling?

Options:
A.

Change all the passwords

B.

Secure the area

C.

Prepare the Jump bag

D.

Notify management

E.

Prepare a report

Questions 90

Which of the following is Azure's version of a superuser?

Options:
A.

Network administrator

B.

Global administrator

C.

Security administrator

D.

Intune administrator