Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSEC - GIAC Security Essentials

Page: 8 / 12
Total 385 questions

What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?

A.

Risk of system crashes and security alerts.

B.

Risk of deletion of backup files.

C.

Risk of modified application configuration files.

D.

Risk of applying untested patches.

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

A.

It uses TCP port 443 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It is a protocol used to provide security for a database server in an internal network.

D.

It uses TCP port 80 as the default port.

A database is accessed through an application that users must authenticate with, on a host that only accepts connections from a subnet where the business unit that uses the data is located. What defense strategy is this?

A.

Information Centric

B.

Threat Modeling

C.

Uniform Production

D.

Vector Oriented

What dots Office 365 use natively for authentication?

A.

Microsoft CHAP

B.

Exchange Online

C.

Azure Active Directory

D.

Central Authentication Service

E.

Extensible Authentication Protocol

You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?

A.

The password of the root user cannot be changed.

B.

Use the PASSWD root command.

Reboot the computer.

C.

Reboot the computer in run level 0. Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

D.

Reboot the computer in run level 1.

Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

Why would someone use port 80 for deployment of unauthorized services?

A.

Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue service.

B.

If someone were to randomly browse to the rogue port 80 service they could be compromised.

C.

This is a technique commonly used to perform a denial of service on the local web server.

D.

HTTP traffic is usually allowed outbound to port 80 through the firewall in most environments.

What cryptographic technique does file Integrity monitoring employ?

A.

Public-key cryptography

B.

One-way hashes

C.

Elliptical curve algorithms

D.

Shared key cryptography

Which file would the entry below be found in?

net.ipv6.conf.all.acctpt-ra=0

A.

/etcsysctl.conf

B.

/etc/crontab

C.

/etc/shadow

D.

/etc/hosts

E.

/etc/pam.d/system-auth

Your CIO has found out that it is possible for an attacker to clone your company's RFID (Radio Frequency ID) based key cards. The CIO has tasked you with finding a way to ensure that anyone entering the building is an employee. Which of the following authentication types would be the appropriate solution to this problem?

A.

Mandatory Access Controls

B.

Bell-LaPadula

C.

Two-Factor

D.

TACACS

Where is the source address located in an IPv4 header?

A.

At an offset of 20 bytes

B.

At an offset of 8 bytes

C.

At an offset of 16 bytes

D.

At an offset of 12 bytes