Pass the GIAC Security Certification: GASF GCED Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

What are Browser Helper Objects (BHO)s used for?

Options:

A.

To provide multi-factor authentication support for Firefox


B.

To provide a more feature-rich interface for Internet Explorer


C.

To allow Internet Explorer to process multi-part URLs


D.

To allow Firefox to process JavaScript in a sandbox


Expert Solution
Questions # 22:

How does an Nmap connect scan work?

Options:

A.

It sends a SYN, waits for a SYN/ACK, then sends a RST.


B.

It sends a SYN, waits for a ACK, then sends a RST.


C.

It sends a SYN, waits for a ACK, then sends a SYN/ACK.


D.

It sends a SYN, waits for a SYN/ACK, then sends a ACK


Expert Solution
Questions # 23:

To detect worms and viruses buried deep within a network packet payload, Gigabytes worth of traffic content entering and exiting a network must be checked with which of the following technologies?

Options:

A.

Proxy matching


B.

Signature matching


C.

Packet matching


D.

Irregular expression matching


E.

Object matching


Expert Solution
Questions # 24:

When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?

Options:

A.

The network connections and open ports


B.

The contents of physical memory


C.

The current routing table


D.

A list of the running services


Expert Solution
Questions # 25:

Which of the following attacks would use “..” notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?

Options:

A.

URL directory


B.

HTTP header attack


C.

SQL injection


D.

IDS evasion


E.

Cross site scripting


Expert Solution
Questions # 26:

A legacy server on the network was breached through an OS vulnerability with no patch available. The server is used only rarely by employees across several business units. The theft of information from the server goes unnoticed until the company is notified by a third party that sensitive information has been posted on the Internet. Which control was the first to fail?

Options:

A.

Security awareness


B.

Access control


C.

Data classification


D.

Incident response


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions