Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSEC - GIAC Security Essentials

Page: 5 / 12
Total 385 questions

Analyze the screenshot below. In what order should the vulnerabilities be remediated?

A.

D, C, B, A

B.

C, D, B, A

C.

C, D, A, B

D.

B, A, D, C,

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

usermod -s

B.

chage

C.

usermod -u

D.

useradd -s

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring an application server. An application named Report, which is owned by the root user, is placed on the server. This application requires superuser permission to write to other files. All sales managers of the company will be using the application. Which of the following steps will you take in order to enable the sales managers to run and use the Report application?

A.

Change the Report application to a SUID command.

B.

Make the user accounts of all the sales managers the members of the root group.

C.

Provide password of root user to all the sales managers.

Ask each sales manager to run the application as the root user.

D.

As the application is owned by the root, no changes are required.

What would the following IP tables command do?

IP tables -I INPUT -s 99.23.45.1/32 -j DROP

A.

Drop all packets from the source address

B.

Input all packers to the source address

C.

Log all packets to or from the specified address

D.

Drop all packets to the specified address

Which of the following elements is the most important requirement to ensuring the success of a business continuity plan?

A.

Disaster Recover Plans

B.

Anticipating all relevant threats

C.

Executive buy-in

D.

Clearly defining roles and responsibilities

E.

Training

Which port category does the port 110 fall into?

A.

Well known port

B.

Dynamic port

C.

Private port

D.

Application port

What could be used to mitigate hash collisions?

A.

Using a larger key space for the encryption

B.

Using additional arbitrary data to append to the file

C.

Using separate keys for encryption and decryption

D.

Using a larger bit length for the algorithm

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

A.

Blowfish

B.

DES

C.

SHA-l

D.

Cast

During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)?

A.

Key Recovery

B.

Initialization

C.

Registration

D.

Certification

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as.

A.

False negative

B.

False positive

C.

True positive

D.

True negative