Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
Questions # 101:

When trace route fails to get a timely response for a packet after three tries, which action will it take?

Options:

A.

It will print '* * *' for the attempts and increase the maximum hop count by one.


B.

It will exit gracefully, and indicate to the user that the destination is unreachable.


C.

It will increase the timeout for the hop and resend the packets.


D.

It will print '* * *' for the attempts, increment the TTL and try again until the maximum hop count.


Expert Solution
Questions # 102:

Which of the following is an advantage of an Intrusion Detection System?

Options:

A.

It is a mature technology.


B.

It is the best network security.


C.

It never needs patching.


D.

It is a firewall replacement.


Expert Solution
Questions # 103:

What would the following IP tables command do?

IP tables -I INPUT -s 99.23.45.1/32 -j DROP

Options:

A.

Drop all packets from the source address


B.

Input all packers to the source address


C.

Log all packets to or from the specified address


D.

Drop all packets to the specified address


Expert Solution
Questions # 104:

For most organizations, which of the following should be the highest priority when it comes to physical security concerns?

Options:

A.

Controlling ingress and egress


B.

Controlling access to workstations


C.

Ensuring employee safety


D.

Controlling access to servers


E.

Protecting physical assets


Expert Solution
Questions # 105:

Which of the following access control principles helps prevent collusion and detect abuse of access?

Options:

A.

Least privilege


B.

Rotation of duties


C.

Separation of duties


D.

Need to know


Expert Solution
Questions # 106:

Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?

Options:

A.

Hotfix


B.

Spam


C.

Biometrics


D.

Buffer overflow


Expert Solution
Questions # 107:

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

Options:

A.

TCP port 443


B.

UDP port 161


C.

TCP port 110


D.

UDP port 1701


Expert Solution
Questions # 108:

An employee attempting to use your wireless portal reports receiving the error shown below. Which scenario is occurring?

Question # 108

Options:

A.

A denial-of-service attack is preventing a response from the portal.


B.

Another access point is deauthenticating legitimate clients.


C.

The encrypted data is being intercepted and decrypted.


D.

Another access point is attempting to intercept the data.


Expert Solution
Questions # 109:

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:

A.

Halon


B.

CO2


C.

Soda acid


D.

Water


Expert Solution
Questions # 110:

A folder D:\Files\Marketing has the following NTFS permissions:

• Administrators: Full Control

• Marketing: Change and Authenticated

• Users: Read

It has been shared on the server as "MARKETING", with the following share permissions:

• Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

Options:

A.

No access


B.

Full Control


C.

Read


D.

Change


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions