Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following statements about policy is FALSE?

Options:

A.

A well-written policy contains definitions relating to "what" to do.


B.

A well-written policy states the specifics of "how" to do something.


C.

Security policy establishes what must be done to protect information stored on computers.


D.

Policy protects people who are trying to do the right thing.


Expert Solution
Questions # 42:

Which of the following commands is used to change file access permissions in Linux?

Options:

A.

chgrp


B.

chperm


C.

chmod


D.

chown


Expert Solution
Questions # 43:

Your CIO has found out that it is possible for an attacker to clone your company's RFID (Radio Frequency ID) based key cards. The CIO has tasked you with finding a way to ensure that anyone entering the building is an employee. Which of the following authentication types would be the appropriate solution to this problem?

Options:

A.

Mandatory Access Controls


B.

Bell-LaPadula


C.

Two-Factor


D.

TACACS


Expert Solution
Questions # 44:

It is possible to sniff traffic from other hosts on a switched Ethernet network by impersonating which type of network device?

Options:

A.

Switch


B.

Bridge


C.

Hub


D.

Router


Expert Solution
Questions # 45:

Which of the following is TRUE regarding Ethernet?

Options:

A.

Stations are not required to monitor their transmission to check for collisions.


B.

Several stations are allowed to be transmitting at any given time within a single collision domain.


C.

Ethernet is shared media.


D.

Stations are not required to listen before they transmit.


Expert Solution
Questions # 46:

Which of the following is required to be backed up on a domain controller to recover Active Directory?

Options:

A.

System state data


B.

Operating System files


C.

User's personal data


D.

Installed third party application's folders


Expert Solution
Questions # 47:

The Return on Investment (ROI) measurement used in Information Technology and Information Security fields is typically calculated with which formula?

Options:

A.

ROI = (gain - expenditure)/(expenditure) X 100%


B.

ROI = (gain + expenditure)/(expenditure) X 100%


C.

ROI = (loss + expenditure)/(expenditure) X 100%


D.

ROI = (loss - expenditure)/(expenditure) X 100%


Expert Solution
Questions # 48:

Included below is the output from a resource kit utility run against local host.

Question # 48

Which command could have produced this output?

Options:

A.

Schtasks


B.

Task kill


C.

SC


D.

Task list


Expert Solution
Questions # 49:

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses Internet Protocol (IP) for data integrity.


B.

It uses Authentication Header (AH) for data integrity.


C.

It uses Password Authentication Protocol (PAP) for user authentication.


D.

It uses Encapsulating Security Payload (ESP) for data confidentiality.


Expert Solution
Questions # 50:

What is achieved with the development of a communication flow baseline?

Options:

A.

Validation of data access


B.

Classification of critical data


C.

Categorization of internal risks


D.

Identification of existing IT assets


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions