Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSEC - GIAC Security Essentials

Page: 12 / 12
Total 385 questions

Which of the below choices should an organization start with when implementing an effective risk management process?

A.

Implement an incident response plan

B.

Define security policy requirements

C.

Conduct periodic reviews

D.

Design controls and develop standards for each technology you plan to deploy

Which of the following areas of a network contains DNS servers and Web servers for Internet users?

A.

VPN

B.

MMZ

C.

VLAN

D.

DMZ

Which of the following is NOT typically used to mitigate the war dialing threat?

A.

Setting up monitored modems on special phone numbers

B.

Setting modems to auto-answer mode

C.

Proactively scanning your own phone numbers

D.

Monitoring call logs at the switch

One of your Linux systems was compromised last night. According to change management history and a recent vulnerability scan, the system's patches were up-to-date at the time of the attack. Which of the following statements is the Most Likely explanation?

A.

It was a zero-day exploit.

B.

It was a Trojan Horse exploit.

C.

It was a worm exploit.

D.

It was a man-in-middle exploit.

What is a limitation of deploying HIPS on a workstation?

A.

Requires more frequent system patching

B.

Requires an HIDS to Identify an attack

C.

Restricted support for custom applications

D.

Runs as a non-privileged user