Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSEC - GIAC Security Essentials

Page: 6 / 12
Total 385 questions

Which of the following is a characteristic of hash operations?

A.

Asymmetric

B.

Non-reversible

C.

Symmetric

D.

Variable length output

What is the purpose of a TTL value?

A.

It represents of hops that a packet can take before being discarded.

B.

It represents the time in minutes that a packet can live before being discarded.

C.

It represents the value that the sequence number should be Incremented by during the next communication.

D.

It represents the number of gateways the packet has passed through and is Increased by 1 for each hop.

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

A.

TCP port 443

B.

UDP port 161

C.

TCP port 110

D.

UDP port 1701

A folder D:\Files\Marketing has the following NTFS permissions:

• Administrators: Full Control

• Marketing: Change and Authenticated

• Users: Read

It has been shared on the server as "MARKETING", with the following share permissions:

• Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

A.

No access

B.

Full Control

C.

Read

D.

Change

Which of the following is an Implementation of PKI?

A.

SSL

B.

3DES

C.

Kerberos

D.

SHA-1

The TTL can be found in which protocol header?

A.

UDP

B.

TCP

C.

IP

D.

ICMP

Which of the following choices accurately describes how PGP works when encrypting email?

A.

PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric key.

B.

PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

C.

PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

D.

PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric key.

Which of the following are examples of Issue-Specific policies all organizations should address?

A.

Perimeter filtering guides, break times for employees, desktop neatness and backup procedures.

B.

Rogue wireless access points, auditing, break time for employees and organizational structure.

C.

Audit logs, physical access, mission statements and network protocols used.

D.

Backup requirements, employee monitoring, physical access and acceptable use.

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

A.

NETSTAT -s

B.

NBTSTAT -s

C.

NBTSTAT -n

D.

NETSTAT -n

Which of the following protocols provides maintenance and error reporting function?

A.

UDP

B.

ICMP

C.

PPP

D.

IGMP