Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which Terraform command should be run immediately after creating a new configuration file for a cloud-based virtual machine?

Options:

A.

Init


B.

Build


C.

Apply


D.

Commit


Expert Solution
Questions # 62:

Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.

This style of defense-in-depth protection is best described as which of the following?

Options:

A.

Uniform protection


B.

Threat-oriented


C.

Information-centric


D.

Protected enclaves


Expert Solution
Questions # 63:

Which of the following protocols describes the operation of security In H.323?

Options:

A.

H.239


B.

H.245


C.

H.235


D.

H.225


Expert Solution
Questions # 64:

Which of the following tools is also capable of static packet filtering?

Options:

A.

netstat.exe


B.

ipsecpol.exe


C.

ipconfig.exe


D.

net.exe


Expert Solution
Questions # 65:

Which of the following statements about DMZ are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the boundary between the Internet and a private network.


B.

It is an anti-virus software that scans the incoming traffic on an internal network.


C.

It contains company resources that are available on the Internet, such as Web servers and

FTP servers.


D.

It contains an access control list (ACL).


Expert Solution
Questions # 66:

Which of the following statements about the integrity concept of information security management are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.


B.

It determines the actions and behaviors of a single individual within a system


C.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.


D.

It ensures that modifications are not made to data by unauthorized personnel or processes.


Expert Solution
Questions # 67:

Against policy, employees have installed Peer-to-Peer applications on their workstations and they are using them over TCP port 80 to download files via the company network from other Peer-to-Peer users on the Internet. Which of the following describes this threat?

Options:

A.

Firewall subversion


B.

Backdoor installation


C.

Malicious software infection


D.

Phishing attempt


Expert Solution
Questions # 68:

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. David, a Sales Manager, wants to know the name of the shell that he is currently using. Which of the following commands will he use to accomplish the task?

Options:

A.

mv $shell


B.

echo $shell


C.

rm $shell


D.

ls $shell


Expert Solution
Questions # 69:

Which of the following statements best describes where a border router is normally placed?

Options:

A.

Between your firewall and your internal network


B.

Between your firewall and DNS server


C.

Between your ISP and DNS server


D.

Between your ISP and your external firewall


Expert Solution
Questions # 70:

Which of the following Unix syslog message priorities is the MOST severe?

Options:

A.

err


B.

emerg


C.

crit


D.

alert


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions