Free Download Pass4sure GIAC Security Administration GSEC GIAC Security Essentials Dumps

GIAC Security Essentials: GSEC Exam
GSEC Questions & Answers
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Q & A: 280 Q&As

QUESTION 1
Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct
answer represents a complete solution. Choose all that apply.
A. SSL provides message integrity to prevent alteration to the message.
B. During SSL session, information is encrypted to prevent unauthorized disclosure.
C. SSL can process credit cards.
D. SSL can support 128-bit encryption.
Answer: ABDQUESTION 2
Which of the following protocols multicasts messages and information among all member devices
in an IP multicast group?
A. IGMP
B. TCP
C. ARP
D. ICMP
Answer: A
QUESTION 3
Which of the following is not an encryption technology?
A. Blowfish
B. KILL
C. 3DES
D. MD5
Answer: B
QUESTION 4
Which of the following statements about the availability concept of Information security
management is true?
A. It ensures reliable and timely access to resources.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures that unauthorized modifications are not made to data by authorized personnel or
processes.
D. It ensures that modifications are not made to data by unauthorized personnel or processes.
Answer: A
QUESTION 5
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will
include 1000BaseT network interface cards in servers and client computers. What is the maximum
segment length that a 1000BaseT network supports?A. 100 meters
B. 480 meters
C. 1000 meters
D. 10 meters
Answer: A
QUESTION 6
The /cat/etc/passwd file on a client computer contains the following entry: Martha:x:::::bin/false
Which of the following is true for Martha?
A. Martha’s password is x.
B. Martha has full access on the computer.
C. Martha has limited access on the computer.
D. Martha has been denied access on the computer.
Answer: D
QUESTION 7
Which of the following terms is synonymous with the willful destruction of another person’s
property?
A. Spoofing
B. Hacking
C. Phishing
D. Vandalism
Answer: D
QUESTION 8
Which of the following is used to implement a procedure to control inbound and outbound traffic on
a network?
A. Cookies
B. Sam Spade
C. NIDS
D. ACL
Answer: D
QUESTION 9
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He executes the following
command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?A. root, 500
B. root, 0
C. John, 502
D. John, 0
Answer: B
QUESTION 10
Which of the following is a security threat if included in the search path of a computer?
A. /usr
B. /sbin
C. .
D. /usr/bin
Answer: C

http://www.lead2pass.com/gsec.html

Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com