New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSEC - GIAC Security Essentials

Page: 7 / 12
Total 385 questions

A Windows administrator wants to automate local and remote management tasks in Active Directory. Which tool is most appropriate for this?

A.

Ipsec

B.

VisualBasic

C.

PowerShell

D.

netsh

E.

ipconfig

A US case involving malicious code is brought to trial. An employee had opened a helpdesk ticket to report specific instances of strange behavior on her system. The IT helpdesk representative collected information by interviewing the user and escalated the ticket to the system administrators. As the user had regulated and sensitive data on her computer, the system administrators had the hard drive sent to the company's forensic consultant for analysis and configured a new hard drive for the user. Based on the recommendations from the forensic consultant and the company's legal department, the CEO decided to prosecute the author of the malicious code. During the court case, which of the following would be able to provide direct evidence?

A.

The IT helpdesk representative

B.

The company CEO

C.

The user of the infected system

D.

The system administrator who removed the hard drive

Which class of IDS events occur when the IDS fails to alert on malicious data?

A.

True Negative

B.

True Positive

C.

False Positive

D.

False Negative

Which of the following quantifies the effects of a potential disaster over a period of time?

A.

Risk Assessment

B.

Business Impact Analysis

C.

Disaster Recovery Planning

D.

Lessons Learned

If the NET_ID of the source and destination address in an IP (Internet Protocol) packet match, which answer BEST describes the routing method the sending host will use?

A.

Local (or direct) routing

B.

Circuit switch routing

C.

Dynamic (or changeable) routing

D.

Remote (or indirect) routing

When an IIS filename extension is mapped, what does this mean?

A.

Files with the mapped extensions cannot be interpreted by the web server.

B.

The file and all the data from the browser's request are handed off to the mapped interpreter.

C.

The files with the mapped extensions are interpreted by CMD.EXE.

D.

The files with the mapped extensions are interpreted by the web browser.

How many clients Is a single WSUS server designed to support when the minimum system requirements are met?

A.

10000

B.

B. 5OOO

C.

1000

Which Defense-in-Depth model involves identifying various means by which threats can become manifest and providing security mechanisms to shut them down?

A.

Vector-oriented

B.

Uniform protection

C.

Information centric defense

D.

Protected enclaves

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

A.

netstat -a | grep FTP

B.

FTP netstat -r

C.

FTP netstat -a

D.

netstat -r | grep FTP

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

A.

The Security ID numbers (SIDs) of all the groups to which you belong

B.

A list of cached authentications

C.

A list of your domain privileges

D.

The Security ID numbers (SIDs) of all authenticated local users