Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSEC - GIAC Security Essentials

Page: 4 / 12
Total 385 questions

Fill in the blank with the correct answer to complete the statement below.

The permission is the minimum required permission that is necessary for a user to enter a directory and list its contents.

You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

A.

killall httpd

B.

endall httpd

C.

kill httpd

D.

end httpd

Which of the following statements about the authentication concept of information security management is true?

A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

It is possible to sniff traffic from other hosts on a switched Ethernet network by impersonating which type of network device?

A.

Switch

B.

Bridge

C.

Hub

D.

Router

Which of the following statements about policy is FALSE?

A.

A well-written policy contains definitions relating to "what" to do.

B.

A well-written policy states the specifics of "how" to do something.

C.

Security policy establishes what must be done to protect information stored on computers.

D.

Policy protects people who are trying to do the right thing.

How can an adversary utilize a stolen database of unsalted password hashes?

A.

Decrypt them to find the dear text passwords

B.

Compare the hashed output of guessed passwords with them

C.

Authenticate with the service associated with the on-line database

D.

Reverse engineer them to find the encryption key

A.

JSON

B.

XML

C.

CEF

D.

LEEF

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

A.

NAT

B.

State Table

C.

Logging

D.

Content filtering

What is a characteristic of iOS security?

A.

Most security features are user configurable

B.

Less restrictive architecture than macOS

C.

Flaw disclosures are sent to the Open Handset Alliance (OHA)

D.

Forbids mobile operator (MO) software

When Net Stumbler is initially launched, it sends wireless frames to which of the following addresses?

A.

Broadcast address

B.

Default gateway address

C.

Subnet address

D.

Network address