Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSEC - GIAC Security Essentials

Page: 11 / 12
Total 385 questions

In PKI, when someone wants to verify that the certificate is valid, what do they use to decrypt the signature?

A.

Receiver's digital signature

B.

X.509 certificate CA's private key

C.

Secret passphrase

D.

CA's public key

What is the name of the command-line tool for Windows that can be used to manage audit policies on remote systems?

A.

SECEDTT.EXE

B.

POLCLI.EXE

C.

REMOTEAUDIT.EXE

D.

AUDITPOL.EXE

You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

A.

Limits on the number of failed logins

B.

Boundary checks on program inputs

C.

Controls against time of check/time of use attacks

D.

Restrictions on file permissions

Which of the following features of Windows 7 allows an administrator to both passively review installed software and configure policies to prevent out-of-date or insecure software from running?

A.

Direct Access

B.

Software Restriction Policies

C.

App Locker

D.

User Account Control

Which aspect of UNIX systems was process accounting originally developed for?

A.

Data warehouse

B.

Time sharing

C.

Process tracking

D.

Real time

Analyze the following screenshot. What conclusion can be drawn about the user account shown?

A.

The user is a domain administrator

B.

The user has a guest privilege level

C.

The user is a local administrator

D.

The user is not authenticated on the domain

Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap.

What is the source port number?

A.

878733706

B.

123

C.

443

D.

878732274

E.

36480

F.

2398730476

G.

1432

Analyze the file below. When will the program /home/sink/utils/remove temp hies.py run?

A.

When a user requests it by connecting to the listening port

B.

When the user 'sink' logs in

C.

At startup when the system enters the multi-user runlevel

D.

At the time specified in the crontab file

On which of the following OSI model layers does IPSec operate?

A.

Physical layer

B.

Network layer

C.

Data-link layer

D.

Session layer

Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?

A.

NSLOOKUP

B.

IPCONFIG

C.

ARP

D.

IFCONFIG