Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

Question # 1

Options:

A.

JSON


B.

XML


C.

CEF


D.

LEEF


Expert Solution
Questions # 2:

What dots Office 365 use natively for authentication?

Options:

A.

Microsoft CHAP


B.

Exchange Online


C.

Azure Active Directory


D.

Central Authentication Service


E.

Extensible Authentication Protocol


Expert Solution
Questions # 3:

When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?

Options:

A.

TCP Sequence Number


B.

Source address


C.

Destination port


D.

Destination address


Expert Solution
Questions # 4:

Which of the following is an example of a BitLocker recovery password?

Options:

A.

01 E6 0J4CCEAF 79A481 08BAC59I 7I BE8B


B.

389627 801256690151785527 909978 568638 271012 905516


C.

6c0b48fafaecb0bf8c2610253ee717at


D.

42VgYAjYV+C7ff6MdeqBGx5Y7V2zFQA=


Expert Solution
Questions # 5:

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Hardening


B.

Authentication


C.

Cryptography


D.

Sanitization


Expert Solution
Questions # 6:

A VPC is created with a CIDR block of 10.22.0.0/16, which of the following private subnets could be Included?

Options:

A.

10.23.0.0/16


B.

10.22.12.0/24


C.

10.23.12.0/26


D.

10.10.10.0/24


Expert Solution
Questions # 7:

What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?

Options:

A.

Template application should be done remotely


B.

Templates must be received from a domain controller


C.

Template application requires domain administrator rights


D.

Template application cannot be automatically reversed


Expert Solution
Questions # 8:

Where are user accounts and passwords stored in a decentralized privilege management environment?

Options:

A.

On a central authentication server.


B.

On more than one server.


C.

On each server.


D.

On a server configured for decentralized privilege management.


Expert Solution
Questions # 9:

Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode?

Options:

A.

Length


B.

Source IP


C.

TTL


D.

Destination IP


Expert Solution
Questions # 10:

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Host-based intrusion detection system (HIDS)


B.

Client-based intrusion detection system (CIDS)


C.

Server-based intrusion detection system (SIDS)


D.

Network intrusion detection system (NIDS)


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions