Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions
Questions # 71:

What is a limitation of deploying HIPS on a workstation?

Options:

A.

Requires more frequent system patching


B.

Requires an HIDS to Identify an attack


C.

Restricted support for custom applications


D.

Runs as a non-privileged user


Expert Solution
Questions # 72:

Launch Calculator (calc.exe). Using PowerShell, retrieve the Calculator Process Information. What is the value of the File Version property?

Hint: The process name of Calculator is calculator

Question # 72

Question # 72

Options:

A.

10.1705.12507.0


B.

10.1902.1603.06155


C.

10.0.19041.1


D.

8.1.2017.26587


E.

8.2017.1009.04153


F.

10.1705.1809.07007


G.

8.2017.0908.29102


Expert Solution
Questions # 73:

Which Linux command could a systems administrator use to determine if an attacker had opened up a new listening port on her system?

Options:

A.

nfsstat


B.

netreport


C.

ps


D.

netstat


E.

vrnstat


Expert Solution
Questions # 74:

Which of the following statements would describe the term "incident" when used in the branch of security known as Incident Handling?

Options:

A.

Any observable network event


B.

Harm to systems


C.

Significant threat of harm to systems


D.

A and C


E.

A, B, and C


F.

B and C


G.

A and B


Expert Solution
Questions # 75:

Dilbert wants to have a script run on his Windows server every time Wally logs into it. Where should he place this script?

Options:

A.

HKEY_LOCAL_MACHINF\SOFTWARE\Mlcrosofl\Wlndows\CurrentVerslon\RunOnce


B.

Default Domain Policy > User Configuration > Windows Settings > Scripts (Logon/Logoff)


C.

HKEY.LOCAL MACHIN\SOFTWARE\Microsolt\Windows\CurrentVersion\Run


D.

Default Domain Policy > Computer Configuration > Windows Settings > Scripts (Startup/Shutdown)


Expert Solution
Questions # 76:

What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?

Options:

A.

These fields are decremented each time a packet is retransmitted to minimize the possibility of routing loops.


B.

These fields are initialized to an initial value to prevent packet fragmentation and fragmentation attacks.


C.

These fields are recalculated based on the required time for a packet to arrive at its destination.


D.

These fields are incremented each time a packet is transmitted to indicate the number of routers that an IP packet has traversed.


Expert Solution
Questions # 77:

Use sudo to launch Snort with the, /etc /snort /snort.conf file In full mode to generate alerts based on incoming traffic to echo. What is the source IP address of the traffic triggering an alert with a destination port of 156?

Note: Snort Is configured to exit after It evaluates 50 packets.

Question # 77

Question # 77

Options:

A.

192.168.^.30


B.

10.72.101.210


C.

10.10.28.19


D.

10.11.10.11


E.

10.10.10.66


F.

192.168.87.68


G.

10.12.10.112


Expert Solution
Questions # 78:

When file integrity checking is enabled, what feature is used to determine if a monitored file has been modified?

Options:

A.

file size


B.

Last modified dale


C.

File change notifications in the Application Event Log


D.

One-way hash


Expert Solution
Questions # 79:

Which of the following is an UDP based protocol?

Options:

A.

telnet


B.

SNMP


C.

IMAP


D.

LDAP


Expert Solution
Questions # 80:

If a DNS client wants to look up the IP address for good.news.com and does not receive an authoritative reply from its local DNS server, which name server is most likely to provide an authoritative reply?

Options:

A.

The news.com domain name server


B.

The .com (top-level) domain name server


C.

The .(root-level) domain name server


D.

The .gov (top-level) domain name server


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions