GIAC Information Security GSEC Exam Dumps and Certification Test Engine [Q152-Q170]

(PDF) GIAC Information Security GSEC Exam and Certification Test Engine

Use GSEC Exam Dumps (2022 PDF Dumps) To Have Reliable GSEC Test Engine

NEW QUESTION 152
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

 
 
 
 

NEW QUESTION 153
Many IIS servers connect to Microsoft SQL databases. Which of the following statements about SQL server security is TRUE?

 
 
 
 

NEW QUESTION 154
What type of attack can be performed against a wireless network using the tool Kismet?

 
 
 
 

NEW QUESTION 155
When are Group Policy Objects (GPOs) NOT applied automatically to workstations?

 
 
 
 

NEW QUESTION 156
You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network. You
have created a script named lf.cgi. You want to provide the following permissions on it:
rwsr-sr–Which of the following commands will you execute?

 
 
 
 

NEW QUESTION 157
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP.
Which of the following commands will you use?

 
 
 
 

NEW QUESTION 158
You have just taken over network support for a small company. They are currently using MAC filtering to secure their wireless network. Is this adequate or not and why or why not?

 
 
 
 

NEW QUESTION 159
Which of the following is a name, symbol, or slogan with which a product is identified?

 
 
 
 

NEW QUESTION 160
Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

 
 
 
 

NEW QUESTION 161
You have set up a local area network for your company. Your firewall separates your network into several sections: a DMZ with semi-public servers (web, dns, email) and an intranet with private servers. A penetration tester gains access to both sections and installs sniffers in each. He is able to capture network traffic for all the devices in the private section but only for one device (the device with the sniffer) in the DMZ. What can be inferred about the design of the system?

 
 
 
 

NEW QUESTION 162
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NEW QUESTION 163
Which of the following commands can you use to create an ext3 file system? Each correct answer represents a complete solution. Choose two.

 
 
 
 

NEW QUESTION 164
Which of the following records is the first entry in a DNS database file?

 
 
 
 

NEW QUESTION 165
Included below is the output from a resource kit utility run against local host.

Which command could have produced this output?

 
 
 
 

NEW QUESTION 166
What is the following sequence of packets demonstrating?

 
 
 
 

NEW QUESTION 167
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

 
 
 
 

NEW QUESTION 168
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain- based network. The network contains ten Windows 2003 member servers, 150 Windows XP Professional client computers. According to the company’s security policy, Mark needs to check whether all the computers in the network have all available security updates and shared folders. He also needs to check the file system type on each computer’s hard disk. Mark installs and runs MBSACLI.EXE with the appropriate switches on a server.
Which of the following tasks will he accomplish?

 
 
 
 

NEW QUESTION 169
SIMULATION
Fill in the blank with the correct answer to complete the statement below.
The permission is the minimum required permission that is necessary for a user to enter a directory and list its contents.

NEW QUESTION 170
When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP’s cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

 
 
 
 

GSEC Dumps Full Questions with Free PDF Questions to Pass: https://www.premiumvcedump.com/GIAC/valid-GSEC-premium-vce-exam-dumps.html