Leads4pass > GIAC > GIAC Certifications > GSEC > GSEC Online Practice Questions and Answers

GSEC Online Practice Questions and Answers

Questions 4

Which of the following is a valid password for a system with the default "Password must meet complexity requirements" setting enabled as part of the GPO Password policy requirements?

A. The Cat Chased its Tail AII Night

B. disk ACCESS failed

C. SETI@HOME

D. SaNS2006

Buy Now
Questions 5

A database is accessed through an application that users must authenticate with, on a host that only accepts connections from a subnet where the business unit that uses the data is located. What defense strategy is this?

A. Information Centric

B. Threat Modeling

C. Uniform Production

D. Vector Oriented

Buy Now
Questions 6

Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?

A. Anomaly detection

B. Vulnerability scanning

C. Perimeter assessment

D. Penetration testing

Buy Now
Questions 7

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux- based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

A. killall

B. ps

C. getpid

D. kill

Buy Now
Questions 8

Which of the following defines the communication link between a Web server and Web applications?

A. CGI

B. PGP

C. Firewall

D. IETF

Buy Now
Questions 9

On which of the following OSI model layers does IPSec operate?

A. Physical layer

B. Network layer

C. Data-link layer

D. Session layer

Buy Now
Questions 10

Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

A. Application

B. System

C. Startup

D. Security

Buy Now
Questions 11

Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?

A. Vulnerability scanner and auditing tool

B. Auditing tool and alerting system

C. Configuration management and alerting system

D. Security patching and vulnerability scanner

Buy Now
Questions 12

What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?

A. Template application should be done remotely

B. Templates must be received from a domain controller

C. Template application requires domain administrator rights

D. Template application cannot be automatically reversed

Buy Now
Questions 13

What would the file permission example "rwsr-sr-x" translate to in absolute mode?

A. 1755

B. 6755

C. 6645

D. 1644

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials (GSEC)
Last Update: Jan 06, 2025
Questions: 384
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99