Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

usermod -s


B.

chage


C.

usermod -u


D.

useradd -s


Expert Solution
Questions # 92:

In preparation to do a vulnerability scan against your company's systems. You've taken the steps below:

You've notified users that there will be a system test.

You've priontized and selected your targets and subnets.

You've configured the system to do a deep scan.

You have a member of your team on call to answer questions.

Which of the following is a necessary step to take prior to starting the scan?

Options:

A.

Placing the incident response team on call.


B.

Clear relevant system log files.


C.

Getting permission to run the scan.


D.

Scheduling the scan to run before OS updates.


Expert Solution
Questions # 93:

Which of the following proxy servers provides administrative controls over the content?

Options:

A.

Content filtering web proxy server


B.

Caching proxy server


C.

Forced proxy server


D.

Web proxy server


Expert Solution
Questions # 94:

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Reduce power consumption


B.

Ease of maintenance


C.

Load balancing


D.

Failover


Expert Solution
Questions # 95:

In order to capture traffic for analysis, Network Intrusion Detection Systems (NIDS) operate with network cards in what mode?

Options:

A.

Discrete


B.

Reporting


C.

Promiscuous


D.

Alert


Expert Solution
Questions # 96:

Which type of risk assessment results are typically categorized as low, medium, or high-risk events?

Options:

A.

Technical


B.

Qualitative


C.

Management


D.

Quantitative


Expert Solution
Questions # 97:

The Windows 'tracert' begins by sending what type of packet to the destination host?

Options:

A.

A UDP packet with a TTL of 1


B.

An ICMP Echo Request


C.

An ICMP Router Discovery


D.

An ICMP Echo Reply


Expert Solution
Questions # 98:

On which of the following OSI model layers does IPSec operate?

Options:

A.

Physical layer


B.

Network layer


C.

Data-link layer


D.

Session layer


Expert Solution
Questions # 99:

What Amazon Web Services (AWS) term describes a grouping of at least one datacenter with redundant power, high speed connections to other data centres and the Internet?

Options:

A.

Management subnet


B.

Availability zone


C.

Region


D.

virtual private cloud


Expert Solution
Questions # 100:

Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

Options:

A.

Both volumes should be converted to NTFS at install time.


B.

First volume should be FAT32 and second volume should be NTFS.


C.

First volume should be EFS and second volume should be FAT32.


D.

Both volumes should be converted to FAT32 with NTFS DACLs.


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions