GIAC GSEC - GIAC Security Essentials
Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?
When should you create the initial database for a Linux file integrity checker?
What is TRUE about Workgroups and Domain Controllers?
What must be added to VLANs to improve security?
Which of the following hardware devices prevents broadcasts from crossing over subnets?
Which field in the IPv6 header is used for QoS. or specifying the priority of the packet?
Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.
In trace route results, what is the significance of an * result?
A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it's in use. What feature of HIPS is being described in this scenario?
