Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

What is a forensic examiner confirming when they create a cryptographic hash, such asMD5 or SHA1, of a file?

Options:

A.

Authentication


B.

Integrity


C.

Confidentiality


D.

Authorization


Expert Solution
Questions # 32:

What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?

Options:

A.

Data Execution Prevention (DEP)


B.

User Account Control (UAC)


C.

Encrypting File System (EFS)


D.

Built-in IPSec Client


Expert Solution
Questions # 33:

To be considered a strong algorithm, an encryption algorithm must be which of the following?

Options:

A.

Secret


B.

Well-known


C.

Confidential


D.

Proprietary


Expert Solution
Questions # 34:

What is the following sequence of packets demonstrating?

Options:

A.

telnet.com.telnet > client.com.38060: F 4289:4289(0) ack 92 win 1024


B.

client.com.38060 > telnet.com.telnet: .ack 4290 win 8760 (DF)


C.

client.com.38060 > telnet.com.telnet: F 92:92(0) ack 4290 win 8760 (DF)


D.

telnet.com.telnet > client.com.38060: .ack 93 win 1024


Expert Solution
Questions # 35:

What is log, pre-processing?

Options:

A.

Removing known bad log event entries


B.

Converting logs from one format to another


C.

Moving log entries of unknown status to an analyst's queue


D.

Transferring logs to short-term storage


Expert Solution
Questions # 36:

What is the term for the software that allows a single physical server to run multiple virtual servers?

Options:

A.

Virtual machine


B.

Hypervisor


C.

Host


D.

Guest


Expert Solution
Questions # 37:

Which aspect of UNIX systems was process accounting originally developed for?

Options:

A.

Data warehouse


B.

Time sharing


C.

Process tracking


D.

Real time


Expert Solution
Questions # 38:

In addition to securing the operating system of production honey pot hosts, what is recommended to prevent the honey pots from assuming the identities of production systems that could result in the denial of service for legitimate users?

Options:

A.

Deploy the honey pot hosts as physically close as possible to production systems.


B.

Deploy the honey pot hosts in an unused part of your address space.


C.

Deploy the honey pot hosts to only respond to attacks.


D.

Deploy the honey pot hosts on used address space.


Expert Solution
Questions # 39:

When an IIS filename extension is mapped, what does this mean?

Options:

A.

Files with the mapped extensions cannot be interpreted by the web server.


B.

The file and all the data from the browser's request are handed off to the mapped interpreter.


C.

The files with the mapped extensions are interpreted by CMD.EXE.


D.

The files with the mapped extensions are interpreted by the web browser.


Expert Solution
Questions # 40:

What Windows log should be checked to troubleshoot a Windows service that is falling to start?

Options:

A.

Application


B.

System


C.

Security


D.

Setup


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions