Skip to content

Free Download Pass4sure GIAC Security Administration GSEC GIAC Security Essentials Dumps

Posted in GIAC

GIAC Security Essentials: GSEC Exam
GSEC Questions & Answers
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Q & A: 280 Q&As

QUESTION 1
Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct
answer represents a complete solution. Choose all that apply.
A. SSL provides message integrity to prevent alteration to the message.
B. During SSL session, information is encrypted to prevent unauthorized disclosure.
C. SSL can process credit cards.
D. SSL can support 128-bit encryption.
Answer: ABDQUESTION 2
Which of the following protocols multicasts messages and information among all member devices
in an IP multicast group?
A. IGMP
B. TCP
C. ARP
D. ICMP
Answer: A
QUESTION 3
Which of the following is not an encryption technology?
A. Blowfish
B. KILL
C. 3DES
D. MD5
Answer: B
QUESTION 4
Which of the following statements about the availability concept of Information security
management is true?
A. It ensures reliable and timely access to resources.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures that unauthorized modifications are not made to data by authorized personnel or
processes.
D. It ensures that modifications are not made to data by unauthorized personnel or processes.
Answer: A
QUESTION 5
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will
include 1000BaseT network interface cards in servers and client computers. What is the maximum
segment length that a 1000BaseT network supports?A. 100 meters
B. 480 meters
C. 1000 meters
D. 10 meters
Answer: A
QUESTION 6
The /cat/etc/passwd file on a client computer contains the following entry: Martha:x:::::bin/false
Which of the following is true for Martha?
A. Martha’s password is x.
B. Martha has full access on the computer.
C. Martha has limited access on the computer.
D. Martha has been denied access on the computer.
Answer: D
QUESTION 7
Which of the following terms is synonymous with the willful destruction of another person’s
property?
A. Spoofing
B. Hacking
C. Phishing
D. Vandalism
Answer: D
QUESTION 8
Which of the following is used to implement a procedure to control inbound and outbound traffic on
a network?
A. Cookies
B. Sam Spade
C. NIDS
D. ACL
Answer: D
QUESTION 9
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He executes the following
command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?A. root, 500
B. root, 0
C. John, 502
D. John, 0
Answer: B
QUESTION 10
Which of the following is a security threat if included in the search path of a computer?
A. /usr
B. /sbin
C. .
D. /usr/bin
Answer: C

http://www.lead2pass.com/gsec.html