Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Files pot


B.

Honey pot


C.

Data pot


D.

Bastion host


Expert Solution
Questions # 52:

Which of the following statements about Secure Sockets Layer (SSL) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It provides communication privacy, authentication, and message integrity.


B.

It provides mail transfer service.


C.

It uses a combination of public key and symmetric encryption for security of data.


D.

It provides connectivity between Web browser and Web server.


Expert Solution
Questions # 53:

Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

Options:

A.

NBTSTAT


B.

NSLOOKUP


C.

PING


D.

NETSTAT


Expert Solution
Questions # 54:

Which of the following attacks can be mitigated by avoiding making system calls from within a web application?

Options:

A.

Denial of Service


B.

OS command injection


C.

SQL Injection


D.

Buffer Overflows


Expert Solution
Questions # 55:

Which of the following is an advantage of private circuits versus VPNs?

Options:

A.

Flexibility


B.

Performance guarantees


C.

Cost


D.

Time required to implement


Expert Solution
Questions # 56:

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTFS gives better file security than FAT16 and FAT32.


B.

Automatic backup.


C.

NTFS file system supports for larger hard disks.


D.

NTFS give improved disk compression than FAT16 and FAT32.


Expert Solution
Questions # 57:

Which of the following correctly describes a stateless packet filter?

Options:

A.

Streams are rebuilt for analysis


B.

Data is passed through unchecked


C.

Packet processing is very slow


D.

Security is verified at the application level


Expert Solution
Questions # 58:

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are required to search for the error messages in the /var/log/messages log file. Which of the following commands will you use to accomplish this?

Options:

A.

ps /var/log/messages


B.

cat /var/log/messages | look error


C.

cat /var/log/messages | grep error


D.

cat /var/log/messages


Expert Solution
Questions # 59:

Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

Options:

A.

Information centric defense


B.

Uniform information protection


C.

General information protection


D.

Perimeter layering


Expert Solution
Questions # 60:

A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it's in use. What feature of HIPS is being described in this scenario?

Options:

A.

Signature Matching


B.

Application Behavior Monitoring


C.

Host Based Sniffing


D.

Application Action Modeling


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions