Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSEC - GIAC Security Essentials

Page: 9 / 12
Total 385 questions

Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

A.

NBTSTAT

B.

NSLOOKUP

C.

PING

D.

NETSTAT

When should you create the initial database for a Linux file integrity checker?

A.

Before a system is patched

B.

After a system has been compromised

C.

Before a system has been compromised

D.

During an attack

What is TRUE about Workgroups and Domain Controllers?

A.

By default all computers running Windows 2008 can only form Domain Controllers not Workgroups

B.

Workgroups are characterized by higher costs while Domain Controllers by lower costs

C.

You cannot have stand-alone computers in the midst of other machines that are members of a domain

D.

Workgroup computers cannot share resources, only computers running on the same domain can

E.

You can have stand-alone computers in the midst of other machines that are members of a domain.

What must be added to VLANs to improve security?

A.

Network hubs

B.

Air gaps

C.

Spanning tree interfaces

D.

Access control lists

Which of the following hardware devices prevents broadcasts from crossing over subnets?

A.

Bridge

B.

Hub

C.

Router

D.

Modem

Which field in the IPv6 header is used for QoS. or specifying the priority of the packet?

A.

Hop Limit

B.

Traffic Class

C.

Version

D.

Next Header

Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?

A.

Hotfix

B.

Spam

C.

Biometrics

D.

Buffer overflow

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

A.

Halon

B.

CO2

C.

Soda acid

D.

Water

In trace route results, what is the significance of an * result?

A.

A listening port was identified.

B.

A reply was returned in less than a second.

C.

The target host was successfully reached.

D.

No reply was received for a particular hop.

A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it's in use. What feature of HIPS is being described in this scenario?

A.

Signature Matching

B.

Application Behavior Monitoring

C.

Host Based Sniffing

D.

Application Action Modeling