GIAC Security Essentials: GSEC Exam
GSEC Questions & Answers
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Q & A: 280 Q&As
Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct
answer represents a complete solution. Choose all that apply.
A. SSL provides message integrity to prevent alteration to the message.
B. During SSL session, information is encrypted to prevent unauthorized disclosure.
C. SSL can process credit cards.
D. SSL can support 128-bit encryption.
Answer: ABDQUESTION 2
Which of the following protocols multicasts messages and information among all member devices
in an IP multicast group?
Which of the following is not an encryption technology?
Which of the following statements about the availability concept of Information security
management is true?
A. It ensures reliable and timely access to resources.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures that unauthorized modifications are not made to data by authorized personnel or
D. It ensures that modifications are not made to data by unauthorized personnel or processes.
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will
include 1000BaseT network interface cards in servers and client computers. What is the maximum
segment length that a 1000BaseT network supports?A. 100 meters
B. 480 meters
C. 1000 meters
D. 10 meters
The /cat/etc/passwd file on a client computer contains the following entry: Martha:x:::::bin/false
Which of the following is true for Martha?
A. Martha’s password is x.
B. Martha has full access on the computer.
C. Martha has limited access on the computer.
D. Martha has been denied access on the computer.
Which of the following terms is synonymous with the willful destruction of another person’s
Which of the following is used to implement a procedure to control inbound and outbound traffic on
B. Sam Spade
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He executes the following
command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?A. root, 500
B. root, 0
C. John, 502
D. John, 0
Which of the following is a security threat if included in the search path of a computer?