GIAC GSEC - GIAC Security Essentials
A Windows administrator wants to automate local and remote management tasks in Active Directory. Which tool is most appropriate for this?
A US case involving malicious code is brought to trial. An employee had opened a helpdesk ticket to report specific instances of strange behavior on her system. The IT helpdesk representative collected information by interviewing the user and escalated the ticket to the system administrators. As the user had regulated and sensitive data on her computer, the system administrators had the hard drive sent to the company's forensic consultant for analysis and configured a new hard drive for the user. Based on the recommendations from the forensic consultant and the company's legal department, the CEO decided to prosecute the author of the malicious code. During the court case, which of the following would be able to provide direct evidence?
Which class of IDS events occur when the IDS fails to alert on malicious data?
Which of the following quantifies the effects of a potential disaster over a period of time?
If the NET_ID of the source and destination address in an IP (Internet Protocol) packet match, which answer BEST describes the routing method the sending host will use?
When an IIS filename extension is mapped, what does this mean?
How many clients Is a single WSUS server designed to support when the minimum system requirements are met?
Which Defense-in-Depth model involves identifying various means by which threats can become manifest and providing security mechanisms to shut them down?
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?
When you log into your Windows desktop what information does your Security Access Token (SAT) contain?
