Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSEC - GIAC Security Essentials

Page: 3 / 12
Total 385 questions

Who is responsible for deciding the appropriate classification level for data within an organization?

A.

Data custodian

B.

Security auditor

C.

End user

D.

Data owner

In the AGULP model, who should be assigned permissions and privileges?

A.

Universal Groups

B.

Local Groups

C.

Individual User Accounts

D.

Global Groups

Which of the following works at the network layer and hides the local area network IP address and topology?

A.

Network address translation (NAT)

B.

Hub

C.

MAC address

D.

Network interface card (NIC)

Based on the iptables output below, which type of endpoint security protection has host 192.168.1.17 implemented for incoming traffic on TCP port 22 (SSH) and TCP port 23 (telnet)?

A.

Operating System Control Firewall

B.

Application Control Firewall

C.

Exclusive Logging Analysis

D.

Packet Filtering Firewall

E.

Application Execution Control

What is the fundamental problem with managing computers in stand-alone Windows workgroups?

A.

Computers in workgroups are not able to create Security Access Tokens (SATs) for their users.

B.

Once a computer joins a workgroup, the Security IDs (SIDs) of its users are transferred to the other computers in the workgroup in clear text.

C.

Computers that have Joined a workgroup cannot subsequently Join a domain.

D.

They do not accept the Security Access Tokens (SATs) from other computer.

An employee attempting to use your wireless portal reports receiving the error shown below. Which scenario is occurring?

A.

A denial-of-service attack is preventing a response from the portal.

B.

Another access point is deauthenticating legitimate clients.

C.

The encrypted data is being intercepted and decrypted.

D.

Another access point is attempting to intercept the data.

Which of the following statements about Microsoft's VPN client software is FALSE?

A.

The VPN interface can be figured into the route table.

B.

The VPN interface has the same IP address as the interface to the network it's been specified to protect.

C.

The VPN client software is built into the Windows operating system.

D.

The VPN tunnel appears as simply another adapter.

The TTL can be found in which protocol header?

A.

It is found in byte 8 of the ICMP header.

B.

It is found in byte 8 of the IP header.

C.

It is found in byte 8 of the TCP header.

D.

It is found in byte 8 of the DNS header.

Where are user accounts and passwords stored in a decentralized privilege management environment?

A.

On a central authentication server.

B.

On more than one server.

C.

On each server.

D.

On a server configured for decentralized privilege management.

Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode?

A.

Length

B.

Source IP

C.

TTL

D.

Destination IP