Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring an application server. An application named Report, which is owned by the root user, is placed on the server. This application requires superuser permission to write to other files. All sales managers of the company will be using the application. Which of the following steps will you take in order to enable the sales managers to run and use the Report application?

Options:

A.

Change the Report application to a SUID command.


B.

Make the user accounts of all the sales managers the members of the root group.


C.

Provide password of root user to all the sales managers.

Ask each sales manager to run the application as the root user.


D.

As the application is owned by the root, no changes are required.


Expert Solution
Questions # 112:

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

SSL


B.

HTTP


C.

TLS


D.

SNMP


Expert Solution
Questions # 113:

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

443


B.

22


C.

21


D.

80


Expert Solution
Questions # 114:

Which of the following is referred to as Electromagnetic Interference (EMI)?

Options:

A.

Electrical line noise


B.

Spike


C.

Transient


D.

Brownout


Expert Solution
Questions # 115:

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

Snort


B.

Apache


C.

SSH


D.

SUDO


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions