Pass4itsure > GIAC > GIAC Certifications > GSEC > GSEC Online Practice Questions and Answers

GSEC Online Practice Questions and Answers

Questions 4

Which of the following is the reason of using Faraday cage?

A. To prevent Denial-of-Service (DoS) attack

B. To prevent shoulder surfing

C. To prevent mail bombing

D. To prevent data emanation

Buy Now
Questions 5

The Windows 'tracert' begins by sending what type of packet to the destination host?

A. A UDP packet with a TTL of 1

B. An ICMP Echo Request

C. An ICMP Router Discovery

D. An ICMP Echo Reply

Buy Now
Questions 6

Which of the following Linux commands can change both the username and group name a file belongs to?

A. chown

B. chgrp

C. chmod

D. newgrp

Buy Now
Questions 7

Which of the following quantifies the effects of a potential disaster over a period of time?

A. Risk Assessment

B. Business Impact Analysis

C. Disaster Recovery Planning

D. Lessons Learned

Buy Now
Questions 8

When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?

A. TCP Sequence Number

B. Source address

C. Destination port

D. Destination address

Buy Now
Questions 9

Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?

A. Eavesdropping attacks cannot be performed through concrete walls.

B. Eavesdropping attacks can take place from miles away.

C. Eavesdropping attacks are easily detected on wireless networks.

D. Eavesdropping attacks require expensive devices.

Buy Now
Questions 10

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

A. Take a full backup daily with the previous night's tape taken offsite.

B. Take a full backup daily and use six-tape rotation.

C. Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

D. Take a full backup on alternate days and keep rotating the tapes.

E. Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

F. Take a full backup daily with one tape taken offsite weekly.

Buy Now
Questions 11

Which of the following attacks can be mitigated by avoiding making system calls from within a web application? Choose two

A. Denial of Service

B. OS command injection

C. SQL Injection

D. Buffer Overflows

Buy Now
Questions 12

The TTL can be found in which protocol header?

A. It is found in byte 8 of the ICMP header.

B. It is found in byte 8 of the IP header.

C. It is found in byte 8 of the TCP header.

D. It is found in byte 8 of the DNS header.

Buy Now
Questions 13

What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

A. These attacks work against relatively idle servers.

B. These attacks rely on a modified TCP/IP stack to function.

C. These attacks can be easily traced back to the source.

D. These attacks only work against Linux/Unix hosts.

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials (GSEC)
Last Update: Jan 04, 2025
Questions: 384
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99