GIAC GSEC - GIAC Security Essentials
You are doing some analysis of malware on a Unix computer in a closed test network. The IP address of the computer is 192.168.1.120. From a packet capture, you see the malware is attempting to do a DNS query for a server called iamabadserver.com so that it can connect to it. There is no DNS server on the test network to do name resolution. You have another computer, whose IP is 192.168.1.115, available on the test network that you would like for the malware connect to it instead. How do you get the malware to connect to that computer on the test network?
If a Linux administrator wanted to quickly filter out extraneous data and find a running process named RootKit, which command could he use?
Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?
Which asymmetric algorithm is used only for key exchange?
Which of the following statements about DMZ are true?
Each correct answer represents a complete solution. Choose two.
Which practice can help protect secrets in a cloud environment?
Which of the following is the FIRST step in performing an Operational Security (OP5EC) Vulnerabilities Assessment?
What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?
Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?
The Linux command to make the /etc/shadow file, already owned by root, readable only by root is which of the following?
