This page was exported from Exams Labs Braindumps [ http://blog.examslabs.com ] Export date:Thu Nov 21 16:21:14 2024 / +0000 GMT ___________________________________________________ Title: Latest GSEC Actual Free Exam Questions Updated 280 Questions [Q167-Q186] --------------------------------------------------- Latest GSEC Actual Free Exam Questions Updated 280 Questions Free GSEC Exam Braindumps certification guide Q&A Q167. You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?Each correct answer represents a complete solution. Choose two.  Reduce power consumption  Ease of maintenance  Load balancing  Failover Q168. What is the key difference between Electronic Codebook mode and other block cipher modes like Cipher Block Chaining, Cipher-Feedback and Output-Feedback?  Plaintext patterns are concealed by XO Ring with previous cipher text block but input to the block cipher is not randomized.  Plaintext patterns are concealed and input to the block cipher is randomized by XO Ring with previous cipher text block.  Plaintext patterns encrypted with the same key will always generate the same Cipher text pattern  Plaintext patterns are not concealed but input to the block cipher is randomized by XO Ring with previous cipher text block. Q169. When discussing access controls, which of the following terms describes the process of determining the activities or functions that an Individual is permitted to perform?  Authentication  Identification  Authorization  Validation Q170. Which of the following commands is used to switch from one user login to another in a Linux computer?  APROPOS  SWUS  SU  >> Q171. Against policy, employees have installed Peer-to-Peer applications on their workstations and they are using them over TCP port 80 to download files via the company network from other Peer-to-Peer users on the Internet. Which of the following describes this threat?  Firewall subversion  Backdoor installation  Malicious software infection  Phishing attempt Q172. Your client wants to choose a DSL connection with the fastest download rate possible. Which DSL would you recommend?  SDSL  FDSL  ADSL  HDSL Q173. Which of the following statements about buffer overflow is true?  It manages security credentials and public keys for message encryption.  It is a collection of files used by Microsoft for software updates released between major service pack releases.  It is a condition in which an application receives more data than it is configured to accept.  It is a false warning about a virus. Q174. Fill in the blank with the command to complete the statement below. The command displays bad login attempts.  LASTB Q175. You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?  PPTP  IPSec  PGP  NTFS Q176. What type of malware is a self-contained program that has the ability to copy itself without parasitically infecting other host code?  Trojans  Boot infectors  Viruses  Worms Q177. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?Each correct answer represents a complete solution. Choose all that apply.  rm private.txt #11 Nov 2009 02:59:58 am  touch -d “11 Nov 2009 02:59:58 am” private.txt  touch private.txt #11 Nov 2009 02:59:58 am  touch -t 200911110259.58 private.txt Q178. Which of the following is more commonly used for establishing high-speed backbones that interconnect smaller networks and can carry signals over significant distances?  Bluetooth  Ethernet  Token ring  Asynchronous Transfer Mode (ATM) Q179. Which of the following types of fire comes under Class K fire?  Wooden fire  Electrical fire  Cooking oil fire  Combustible metal fire Q180. Which of the following terms refers to manual assignment of IP addresses to computers and devices?  Static IP addressing  Spoofing  APIPA  Dynamic IP addressing Q181. You want to make Rick an owner of the files TRADE1.TXT and TRDREPORT.TXT. Which of the following commands will you use to accomplish this?  chown rick TRADE1.TXT TRDREPORT.TXT  chown rick TRADE1.TXT + TRDREPORT.TXT  chgrp rick TRADE1.TXT TRDREPORT.TXT  chgrp rick TRADE1.TXT + TRDREPORT.TXT Q182. What is the name of the command-line tool for Windows that can be used to manage audit policies on remote systems?  SECEDTT.EXE  POLCLI.EXE  REMOTEAUDIT.EXE  AUDITPOL.EXE Q183. What is the main reason that DES is faster than RSA?  DES is less secure.  DES is implemented in hardware and RSA is implemented in software.  Asymmetric cryptography is generally much faster than symmetric.  Symmetric cryptography is generally much faster than asymmetric. Q184. Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?Each correct answer represents a complete solution. Choose two.  The client can optionally authenticate the server.  The client always authenticates the server.  The server always authenticates the client.  The server can optionally authenticate the client. Q185. You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company’s network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?  Take a full backup daily with the previous night’s tape taken offsite.  Take a full backup daily and use six-tape rotation.  Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday’s backup offsite.  Take a full backup on alternate days and keep rotating the tapes.  Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday’s backup offsite.  Take a full backup daily with one tape taken offsite weekly. Q186. You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?  mv $shell  echo $shell  rm $shell  ls $shell  Loading … GSEC Certified Professional Salary Europe: 69,426 EuroEngland: 59,160 PoundIndia: 5,47,036 INRUnited States: 77k USD How to book GSEC Exams In order to apply for the GSEC, You have to follow these steps Go to the GSEC Official SiteRead the instruction CarefullyFollow the given stepsApply for the GSEC   GSEC Certification Overview Latest GSEC PDF Dumps: https://www.examslabs.com/GIAC/GIAC-Information-Security/best-GSEC-exam-dumps.html --------------------------------------------------- Images: https://blog.examslabs.com/wp-content/plugins/watu/loading.gif https://blog.examslabs.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-01-29 16:07:19 Post date GMT: 2023-01-29 16:07:19 Post modified date: 2023-01-29 16:07:19 Post modified date GMT: 2023-01-29 16:07:19