Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following services resolves host name to IP Address?

Options:

A.

Computer Browser


B.

DHCP


C.

DNS


D.

WINS


Expert Solution
Questions # 12:

What is the maximum passphrase length in Windows 2000/XP/2003?

Options:

A.

255 characters


B.

127 characters


C.

95 characters


D.

63 characters


Expert Solution
Questions # 13:

Critical information is encrypted within an application accessible only to a small group of administrators, with a separate group of administrators holding the decryption keys. What Defense in Depth approach is being used?

Options:

A.

Information-Centric


B.

Uniform Protection


C.

Protected Enclaves


D.

Threat Vector Analysis


Expert Solution
Questions # 14:

What method do Unix-type systems use to prevent attackers from cracking passwords using pre-computed hashes?

Options:

A.

Unix systems can prevent users from using dictionary words for passwords


B.

The algorithms creates hashes using a CPU- intensive algorithm.


C.

The algorithm creates hashes using salts or randomized values


D.

Unix/Linux systems use hashing functions which cannot be reversed


E.

The system encrypts the password using a symmetrical algorithm


Expert Solution
Questions # 15:

How many clients Is a single WSUS server designed to support when the minimum system requirements are met?

Options:

A.

10000


B.

B. 5OOO


C.

1000


Expert Solution
Questions # 16:

Which of the following resources is a knowledge base of real-world observed adversary tactics and techniques?

Options:

A.

Lockheed Martin Cyber Kill Chain


B.

MITRE ATT&CK


C.

CIS Controls


D.

NIST Framework


Expert Solution
Questions # 17:

In trace route results, what is the significance of an * result?

Options:

A.

A listening port was identified.


B.

A reply was returned in less than a second.


C.

The target host was successfully reached.


D.

No reply was received for a particular hop.


Expert Solution
Questions # 18:

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

smbmount


B.

mount smb


C.

smbfsmount


D.

mount -t smbfs


Expert Solution
Questions # 19:

Why would someone use port 80 for deployment of unauthorized services?

Options:

A.

Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue service.


B.

If someone were to randomly browse to the rogue port 80 service they could be compromised.


C.

This is a technique commonly used to perform a denial of service on the local web server.


D.

HTTP traffic is usually allowed outbound to port 80 through the firewall in most environments.


Expert Solution
Questions # 20:

Which of the following attack vectors are addressed by Xinetd and TCP Wrappers?

Options:

A.

Outsider attack from network


B.

Outsider attack from a telephone


C.

Insider attack from local network


D.

Attack from previously installed malicious code


E.

A and B


F.

A and C


G.

B and D


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions