GIAC GSEC - GIAC Security Essentials
You have implemented a firewall on the company's network for blocking unauthorized network connections. Which of the following types of security control is implemented in this case?
Which AWS service integrates with the Amazon API Gateway to provision and renew TLS encryption needs for data in transit?
In a /24 subnet, which of the following is a valid broadcast address?
To be considered a strong algorithm, an encryption algorithm must be which of the following?
Which of the following is a backup strategy?
Which of the following tasks is the responsibility of a Linux systems administrator who is deploying hardening scripts to his systems?
What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?
What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?
A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?