Pass4itsure > GIAC > GIAC Information Security > GSEC > GSEC Online Practice Questions and Answers

GSEC Online Practice Questions and Answers

Questions 4

Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

A. The server is not using a well-known port.

B. The server is on a different network.

C. The client-side source ports are different.

D. The clients are on different subnets.

Buy Now
Questions 5

Which of the following is a valid password for a system with the default "Password must meet complexity requirements" setting enabled as part of the GPO Password policy requirements?

A. The Cat Chased its Tail AII Night

B. disk ACCESS failed

C. SETI@HOME

D. SaNS2006

Buy Now
Questions 6

Many IIS servers connect to Microsoft SQL databases. Which of the following statements about SQL server security is TRUE?

A. SQL Server patches are part of the operating system patches.

B. SQL Server should be installed on the same box as your IIS web server when they communicate as part of the web application.

C. It is good practice to never use integrated Windows authentication for SQL Server.

D. It is good practice to not allow users to send raw SQL commands to the SQL Server.

Buy Now
Questions 7

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

A. The Security ID numbers (SIDs) of all the groups to which you belong

B. A list of cached authentications

C. A list of your domain privileges

D. The Security ID numbers (SIDs) of all authenticated local users

Buy Now
Questions 8

What is the discipline of establishing a known baseline and managing that condition known as?

A. Condition deployment

B. Observation discipline

C. Security establishment

D. Configuration management

Buy Now
Questions 9

Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

A. Information centric defense

B. Uniform information protection

C. General information protection

D. Perimeter layering

Buy Now
Questions 10

The Return on Investment (ROI) measurement used in Information Technology and Information Security fields is typically calculated with which formula?

A. ROI = (gain - expenditure)/(expenditure) X 100%

B. ROI = (gain + expenditure)/(expenditure) X 100%

C. ROI = (loss + expenditure)/(expenditure) X 100%

D. ROI = (loss - expenditure)/(expenditure) X 100%

Buy Now
Questions 11

You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company. You have physically installed sensors at all key positions throughout the network such that they all report to the command console.

What will be the key functions of the sensors in such a physical layout? Each correct answer represents a complete solution. Choose all that apply.

A. To collect data from operating system logs

B. To notify the console with an alert if any intrusion is detected

C. To analyze for known signatures

D. To collect data from Web servers

Buy Now
Questions 12

What does the "x" character in the second field of the user account record of the /etc/passwd file indicate?

A. The user account is using a shadow password.

B. The user account is shared by more than one user.

C. The user account is disabled.

D. The user account does not exist.

Buy Now
Questions 13

Which of the following processes is known as sanitization?

A. Assessing the risk involved in discarding particular information.

B. Verifying the identity of a person, network host, or system process.

C. Physically destroying the media and the information stored on it.

D. Removing the content from the media so that it is difficult to restore.

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials Certification
Last Update: Apr 24, 2024
Questions: 384
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99