Shortcuts To GSEC(21 to 30)

Act now and download your GIAC GSEC test today! Do not waste time for the worthless GIAC GSEC tutorials. Download Update GIAC GIAC Security Essentials Certification exam with real questions and answers and begin to learn GIAC GSEC with a classic professional.

Q21. You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use? 

A. netstat -a | grep FTP 

B. FTP netstat -r 

C. FTP netstat -a 

D. netstat -r | grep FTP 

Answer:


Q22. When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as. 

A. False negative 

B. False positive 

C. True positive 

D. True negative 

Answer:


Q23. You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems? 

Each correct answer represents a complete solution. Choose all that apply. 

A. NTFS gives better file security than FAT16 and FAT32. 

B. Automatic backup. 

C. NTFS file system supports for larger hard disks. 

D. NTFS give improved disk compression than FAT16 and FAT32. 

Answer: A,C,D 


Q24. Which of the following is a benefit to utilizing Cygwin for Windows? 

A. The ability to install a complete Red Hat operating system Install on Windows. 

B. The ability to bring much more powerful scripting capabilities to Windows. 

C. The ability to run a production Apache server. 

D. The ability to install a complete Ubuntu operating system install on Windows. 

Answer:


Q25. CORRECT TEXT 

Fill in the blank with the correct answer to complete the statement below. 

The permission is the minimum required permission that is necessary for a user to enter a directory and list its contents. 

Answer: Read 


Q26. You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem? 

A. A firewall is blocking him. 

B. His laptop is incompatible. 

C. MAC filtering is blocking him. 

D. His operating system is incompatible. 

Answer:


Q27. Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode? 

A. Length 

B. Source IP 

C. TTL 

D. Destination IP 

Answer:

36. Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address? 

A. RARP 

B. ARP 

C. DNS 

D. RDNS 

Answer:


Q28. With regard to defense-in-depth, which of the following statements about network design principles is correct? 

A. A secure network design requires that systems that have access to the Internet should not be accessible from the Internet and that systems accessible from the Internet should not have access to the Internet. 

B. A secure network design requires that networks utilize VLAN (Virtual LAN) implementations to insure that private and semi-public systems are unable to reach each other without going through a firewall. 

C. A secure network design will seek to provide an effective administrative structure by providing a single choke-point for the network from which all security controls and restrictions will be enforced. 

D. A secure network design will seek to separate resources by providing a security boundary between systems that have different network security requirements. 

Answer:


Q29. Which of the following elements is the most important requirement to ensuring the success of a business continuity plan? 

A. Disaster Recover Plans 

B. Anticipating all relevant threats 

C. Executive buy-in 

D. Clearly defining roles and responsibilities 

E. Training 

Answer:


Q30. Which of the following should be implemented to protect an organization from spam? 

A. Auditing 

B. System hardening 

C. E-mail filtering 

D. Packet filtering 

Answer: