GIAC GSEC - GIAC Security Essentials
What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.
A database is accessed through an application that users must authenticate with, on a host that only accepts connections from a subnet where the business unit that uses the data is located. What defense strategy is this?
What dots Office 365 use natively for authentication?
You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?
Why would someone use port 80 for deployment of unauthorized services?
What cryptographic technique does file Integrity monitoring employ?
Which file would the entry below be found in?
net.ipv6.conf.all.acctpt-ra=0
Your CIO has found out that it is possible for an attacker to clone your company's RFID (Radio Frequency ID) based key cards. The CIO has tasked you with finding a way to ensure that anyone entering the building is an employee. Which of the following authentication types would be the appropriate solution to this problem?
Where is the source address located in an IPv4 header?
