GIAC GSEC - GIAC Security Essentials
Which of the following is a characteristic of hash operations?
What is the purpose of a TTL value?
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?
A folder D:\Files\Marketing has the following NTFS permissions:
• Administrators: Full Control
• Marketing: Change and Authenticated
• Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
• Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?
Which of the following is an Implementation of PKI?
The TTL can be found in which protocol header?
Which of the following choices accurately describes how PGP works when encrypting email?
Which of the following are examples of Issue-Specific policies all organizations should address?
You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?
Which of the following protocols provides maintenance and error reporting function?
