Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSEC - GIAC Security Essentials

Page: 1 / 12
Total 385 questions

You have implemented a firewall on the company's network for blocking unauthorized network connections. Which of the following types of security control is implemented in this case?

A.

Detective

B.

Preventive

C.

Directive

D.

Corrective

Which AWS service integrates with the Amazon API Gateway to provision and renew TLS encryption needs for data in transit?

A.

Certificate Manager

B.

Key Management Server

C.

Web Application firewall

D.

Security Token Service

In a /24 subnet, which of the following is a valid broadcast address?

A.

200.11.11.1

B.

221.10.10.10

C.

245.20.30.254

D.

192.10.10.255

To be considered a strong algorithm, an encryption algorithm must be which of the following?

A.

Secret

B.

Well-known

C.

Confidential

D.

Proprietary

Which of the following is a backup strategy?

A.

Differential

B.

Integrational

C.

Recursive

D.

Supplemental

Which of the following tasks is the responsibility of a Linux systems administrator who is deploying hardening scripts to his systems?

A.

Run them immediately after installation and before configuring system services.

B.

Ensure they are automatically run during the default installation of the OS.

C.

Test in a development environment before rolling out to production.

D.

Apply the same script(s) to every Linux host within the enterprise.

What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

A.

SCHTASKS.EXE

B.

SCHEDULETSKS.EXE

C.

SCHEDULR.EXE

D.

SCHRUN.EXE

What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?

A.

Data Execution Prevention (DEP)

B.

User Account Control (UAC)

C.

Encrypting File System (EFS)

D.

Built-in IPSec Client

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

A.

nice -n 19 cc -c *.c &

B.

nice cc -c *.c &

C.

nice -n -20 cc -c *.c &

D.

nice cc -c *.c

A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?

A.

Power

B.

Smoke

C.

Natural Gas

D.

Water

E.

Toxins