Pass the GIAC Security Administration GSEC Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

During a scheduled evacuation training session the following events took place in this order:

1. Evacuation process began by triggering the building fire alarm.

2a. The meeting point leader arrived first at the designated meeting point and immediately began making note of who was and was not accounted for.

2b. Stairwell and door monitors made it to their designated position to leave behind a box of flashlights and prop the stairway doors open with a garbage can so employees can find exits and dispose of food and beverages.

2c. Special needs assistants performed their assigned responsibility to help employees out that require special assistance.

3. The safety warden communicated with the meeting point leader via walkie talkie to collect a list of missing personnel and communicated this information back to the searchers.

4. Searchers began checking each room and placing stick-it notes on the bottom of searched doors to designate which areas were cleared.

5. All special need assistants and their designated wards exited the building.

6. Searchers complete their assigned search pattern and exit with the Stairwell/door monitors.

Given this sequence of events, which role is in violation of its expected evacuation tasks?

Options:

A.

Safety warden


B.

Stairwell and door monitors


C.

Meeting point leader


D.

Searchers


E.

Special needs assistants


Expert Solution
Questions # 82:

What is the term for a game in which for every win there must be an equivalent loss?

Options:

A.

Asymmetric


B.

Untenable


C.

Zero-sum


D.

Gain-oriented


Expert Solution
Questions # 83:

Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

Options:

A.

The server is not using a well-known port.


B.

The server is on a different network.


C.

The client-side source ports are different.


D.

The clients are on different subnets.


Expert Solution
Questions # 84:

Analyze the screenshot below. In what order should the vulnerabilities be remediated?

Question # 84

Options:

A.

D, C, B, A


B.

C, D, B, A


C.

C, D, A, B


D.

B, A, D, C,


Expert Solution
Questions # 85:

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

Options:

A.

killall


B.

ps


C.

getpid


D.

kill


Expert Solution
Questions # 86:

You have set up a local area network for your company. Your firewall separates your network into several sections: a DMZ with semi-public servers (web, dns, email) and an intranet with private servers. A penetration tester gains access to both sections and installs sniffers in each. He is able to capture network traffic for all the devices in the private section but only for one device (the device with the sniffer) in the DMZ. What can be inferred about the design of the system?

Options:

A.

You installed a router in the private section and a switch in the DMZ


B.

You installed a hub in the private section and a switch in the DMZ


C.

You installed a switch in the private section and a hub in the DMZ


D.

You installed a switch in the private section and a router in the DMZ


Expert Solution
Questions # 87:

You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:

* they contain only numerals

* they contain only letters

* they contain only special characters

* they contain only letters and numerals

" they contain only letters and special characters

* they contain only numerals and special characters

Of the following, what is the benefit to using this set of tests?

Options:

A.

They are focused on cracking passwords that use characters prohibited by the password policy


B.

They find non-compliant passwords without cracking compliant passwords.


C.

They are focused on cracking passwords that meet minimum complexity requirements


D.

They crack compliant and non-compliant passwords to determine whether the current policy is strong enough


Expert Solution
Questions # 88:

An IT security manager is trying to quickly assess the risks associated with not implementing a corporate firewall system. What sort of risk assessment is most appropriate?

Options:

A.

Annualized Risk Assessment


B.

Qualitative risk assessment


C.

Quantitative risk assessment


D.

Technical Risk Assessment


E.

Iterative Risk Assessment


Expert Solution
Questions # 89:

The TTL can be found in which protocol header?

Options:

A.

It is found in byte 8 of the ICMP header.


B.

It is found in byte 8 of the IP header.


C.

It is found in byte 8 of the TCP header.


D.

It is found in byte 8 of the DNS header.


Expert Solution
Questions # 90:

Use PowerShell ISE to

examineC:\Windows\security\templates\WorkstationSecureTemplate.inf. Which setting is configured in the template?

Question # 90

Question # 90

Options:

A.

ResetLockoutCount


B.

NewAdministratorName


C.

MinirnumPasswordAge


D.

Require logonToChangoPassword


E.

SeRemotPlnteractiveLogonRlght


F.

MaxRenewAge


G.

AuditSystemEvents


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions