Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following processes Is used to prove a user Is who they claim to be based upon something they know, have, are, and/or their physical location?

Options:

A.

Authorization


B.

Accounting


C.

Administration


D.

Authentication


E.

Identification


Expert Solution
Questions # 22:

In PKI, when someone wants to verify that the certificate is valid, what do they use to decrypt the signature?

Options:

A.

Receiver's digital signature


B.

X.509 certificate CA's private key


C.

Secret passphrase


D.

CA's public key


Expert Solution
Questions # 23:

Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

Options:

A.

Application


B.

System


C.

Startup


D.

Security


Expert Solution
Questions # 24:

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

Options:

A.

nice -n 19 cc -c *.c &


B.

nice cc -c *.c &


C.

nice -n -20 cc -c *.c &


D.

nice cc -c *.c


Expert Solution
Questions # 25:

Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

Options:

A.

RARP


B.

ARP


C.

DNS


D.

RDNS


Expert Solution
Questions # 26:

At what point in the Incident Handling process should an organization determine its approach to notifying law enforcement?

Options:

A.

When performing analysis


B.

When preparing policy


C.

When recovering from the incident


D.

When reacting to an incident


Expert Solution
Questions # 27:

Which AWS service integrates with the Amazon API Gateway to provision and renew TLS encryption needs for data in transit?

Options:

A.

Certificate Manager


B.

Key Management Server


C.

Web Application firewall


D.

Security Token Service


Expert Solution
Questions # 28:

What type of attack can be performed against a wireless network using the tool Kismet?

Options:

A.

IP spoofing


B.

Eavesdropping


C.

Masquerading


D.

Denial of Service


Expert Solution
Questions # 29:

Which of the following is a valid password for a system with the default "Password must meet complexity requirements" setting enabled as part of the GPO Password policy requirements?

Options:

A.

The Cat Chased its Tail AII Night


B.

disk ACCESS failed


C.

SETI@HOME


D.

SaNS2006


Expert Solution
Questions # 30:

Which of the following logging tasks should be evaluated in real-time?

Options:

A.

Inside and perimeter log trends review


B.

Routine account creation/removal


C.

Log management system performance


D.

Loss of service on critical assets


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions