New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > GIAC > Security Administration > GSEC

GSEC GIAC Security Essentials Question and Answers

Question # 4

Which of the following attack vectors are addressed by Xinetd and TCP Wrappers?

A.

Outsider attack from network

B.

Outsider attack from a telephone

C.

Insider attack from local network

D.

Attack from previously installed malicious code

E.

A and B

F.

A and C

G.

B and D

Full Access
Question # 5

Which of the following is an UDP based protocol?

A.

telnet

B.

SNMP

C.

IMAP

D.

LDAP

Full Access
Question # 6

What is the fundamental problem with managing computers in stand-alone Windows workgroups?

A.

Computers in workgroups are not able to create Security Access Tokens (SATs) for their users.

B.

Once a computer joins a workgroup, the Security IDs (SIDs) of its users are transferred to the other computers in the workgroup in clear text.

C.

Computers that have Joined a workgroup cannot subsequently Join a domain.

D.

They do not accept the Security Access Tokens (SATs) from other computer.

Full Access
Question # 7

Which of the following Microsoft services integrates SSO into Microsoft 365 by syncing with on-premises servers?

A.

Intune

B.

Azure AD Connect

C.

Teams

D.

Azure Key Vault

Full Access
Question # 8

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Copyright

B.

Trademark

C.

Trade secret

D.

Patent

Full Access
Question # 9

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

A.

They allow an attacker to conduct a buffer overflow.

B.

They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

C.

They allow an attacker to replace utility programs that can be used to detect the attacker's activity.

D.

They allow an attacker to run packet sniffers secretly to capture passwords.

Full Access
Question # 10

Which of the following is a Personal Area Network enabled device?

A.

Corporate access point extender

B.

Bluetooth mouse

C.

Home Win router

D.

Network enabled printer

Full Access
Question # 11

Which of the following is a signature-based intrusion detection system (IDS) ?

A.

RealSecure

B.

Snort

C.

StealthWatch

D.

Tripwire

Full Access
Question # 12

Which of the following protocols describes the operation of security In H.323?

A.

H.239

B.

H.245

C.

H.235

D.

H.225

Full Access
Question # 13

Which of the following files contains the shadowed password entries in Linux?

A.

/etc/passwd

B.

/etc/shadow

C.

/etc/profile

D.

/etc/shdpwd

Full Access
Question # 14

The Linux command to make the /etc/shadow file, already owned by root, readable only by root is which of the following?

A.

chmod 444/etc/shadow

B.

chown root: root/etc/shadow

C.

chmod 400/etc/shadow

D.

chown 400 /etc/shadow

Full Access
Question # 15

What is achieved with the development of a communication flow baseline?

A.

Validation of data access

B.

Classification of critical data

C.

Categorization of internal risks

D.

Identification of existing IT assets

Full Access
Question # 16

What is the purpose of a TTL value?

A.

It represents of hops that a packet can take before being discarded.

B.

It represents the time in minutes that a packet can live before being discarded.

C.

It represents the value that the sequence number should be Incremented by during the next communication.

D.

It represents the number of gateways the packet has passed through and is Increased by 1 for each hop.

Full Access
Question # 17

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

A.

TCP port 443

B.

UDP port 161

C.

TCP port 110

D.

UDP port 1701

Full Access
Question # 18

What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?

A.

Data Execution Prevention (DEP)

B.

User Account Control (UAC)

C.

Encrypting File System (EFS)

D.

Built-in IPSec Client

Full Access
Question # 19

You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?

A.

The password of the root user cannot be changed.

B.

Use the PASSWD root command.

Reboot the computer.

C.

Reboot the computer in run level 0. Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

D.

Reboot the computer in run level 1.

Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

Full Access
Question # 20

Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?

A.

Analysis of encrypted traffic

B.

Provide insight into network traffic

C.

Detection of network operations problems

D.

Provide logs of network traffic that can be used as part of other security measures.

E.

Inexpensive to manage

F.

B, C, and D

G.

A, C, and E

Full Access
Question # 21

What file instructs programs like Web spiders NOT to search certain areas of a site?

A.

Robots.txt

B.

Restricted.txt

C.

Spider.txt

D.

Search.txt

Full Access
Question # 22

Which of the following is NOT typically used to mitigate the war dialing threat?

A.

Setting up monitored modems on special phone numbers

B.

Setting modems to auto-answer mode

C.

Proactively scanning your own phone numbers

D.

Monitoring call logs at the switch

Full Access
Question # 23

Against policy, employees have installed Peer-to-Peer applications on their workstations and they are using them over TCP port 80 to download files via the company network from other Peer-to-Peer users on the Internet. Which of the following describes this threat?

A.

Firewall subversion

B.

Backdoor installation

C.

Malicious software infection

D.

Phishing attempt

Full Access
Question # 24

Your system has been infected by malware. Upon investigation, you discover that the malware propagated primarily via email. The malware attacked known vulnerabilities for which patches are available, but due to problems with your configuration management system you have no way to know which systems have been patched and which haven't, slowing your progress in patching your network. Of the following, which solution would you use to protect against this propagation vector?

A.

Encrypt the emails on the server

B.

Scan and block suspect email attachments at the email server

C.

Install a firewall between the email server and the Internet

D.

Separate the email server from the trusted portions of the network

Full Access
Question # 25

What is the most secure way to address an unused Windows service so it cannot be exploited by malware?

A.

Firewall it

B.

Set to manual startup

C.

Disable it

D.

Uninstall it

Full Access
Question # 26

In addition to securing the operating system of production honey pot hosts, what is recommended to prevent the honey pots from assuming the identities of production systems that could result in the denial of service for legitimate users?

A.

Deploy the honey pot hosts as physically close as possible to production systems.

B.

Deploy the honey pot hosts in an unused part of your address space.

C.

Deploy the honey pot hosts to only respond to attacks.

D.

Deploy the honey pot hosts on used address space.

Full Access
Question # 27

Which of the following features of Windows 7 allows an administrator to both passively review installed software and configure policies to prevent out-of-date or insecure software from running?

A.

Direct Access

B.

Software Restriction Policies

C.

App Locker

D.

User Account Control

Full Access
Question # 28

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

SSL

B.

HTTP

C.

TLS

D.

SNMP

Full Access
Question # 29

What cryptographic technique does file Integrity monitoring employ?

A.

Public-key cryptography

B.

One-way hashes

C.

Elliptical curve algorithms

D.

Shared key cryptography

Full Access
Question # 30

Why are false positives such a problem with IPS technology?

A.

File integrity is not guaranteed.

B.

Malicious code can get into the network.

C.

Legitimate services are not delivered.

D.

Rules are often misinterpreted.

Full Access
Question # 31

Which asymmetric algorithm is used only for key exchange?

A.

EI Gamal

B.

Diffuse-H an

C.

ECC

D.

DSA

Full Access
Question # 32

When trace route fails to get a timely response for a packet after three tries, which action will it take?

A.

It will print '* * *' for the attempts and increase the maximum hop count by one.

B.

It will exit gracefully, and indicate to the user that the destination is unreachable.

C.

It will increase the timeout for the hop and resend the packets.

D.

It will print '* * *' for the attempts, increment the TTL and try again until the maximum hop count.

Full Access
Question # 33

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

A.

Snort

B.

Apache

C.

SSH

D.

SUDO

Full Access
Question # 34

An email system administrator deploys a configuration blocking all inbound and outbound executable files due to security concerns.

What Defense in Depth approach is being used?

A.

Protected Enclaves

B.

Uniform Protection

C.

Vector Oriented

D.

Information Centric

Full Access
Question # 35

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

A.

NAT

B.

State Table

C.

Logging

D.

Content filtering

Full Access
Question # 36

What is the term for the software that allows a single physical server to run multiple virtual servers?

A.

Virtual machine

B.

Hypervisor

C.

Host

D.

Guest

Full Access
Question # 37

Which of the following is a type of countermeasure that can be deployed to ensure that a threat vector does not meet a vulnerability?

A.

Prevention controls

B.

Detection controls

C.

Monitoring controls

D.

Subversive controls

Full Access
Question # 38

Based on the iptables output below, which type of endpoint security protection has host 192.168.1.17 implemented for incoming traffic on TCP port 22 (SSH) and TCP port 23 (telnet)?

A.

Operating System Control Firewall

B.

Application Control Firewall

C.

Exclusive Logging Analysis

D.

Packet Filtering Firewall

E.

Application Execution Control

Full Access
Question # 39

Which of the following statements about the integrity concept of information security management are true?

Each correct answer represents a complete solution. Choose three.

A.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

B.

It determines the actions and behaviors of a single individual within a system

C.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Full Access
Question # 40

Why would someone use port 80 for deployment of unauthorized services?

A.

Google will detect the service listing on port 80 and post a link, so that people all over the world will surf to the rogue service.

B.

If someone were to randomly browse to the rogue port 80 service they could be compromised.

C.

This is a technique commonly used to perform a denial of service on the local web server.

D.

HTTP traffic is usually allowed outbound to port 80 through the firewall in most environments.

Full Access
Question # 41

What security practice is described by NIST as the application of science to the identification, collection, examination, and analysis of data while maintaining data integrity and chain of custody?

A.

Digital forensics

B.

Vulnerability Assessments

C.

Penetration Tests

D.

Incident Response

Full Access
Question # 42

Which of the following protocols is used to send e-mails on the Internet?

A.

SMTP

B.

IMAP4

C.

POP3

D.

HTTP

Full Access
Question # 43

Which of the following is an example of a BitLocker recovery password?

A.

01 E6 0J4CCEAF 79A481 08BAC59I 7I BE8B

B.

389627 801256690151785527 909978 568638 271012 905516

C.

6c0b48fafaecb0bf8c2610253ee717at

D.

42VgYAjYV+C7ff6MdeqBGx5Y7V2zFQA=

Full Access
Question # 44

Which choice best describes the line below?

alert tcp any any -> 192.168.1.0/24 80 (content: /cgi-bin/test.cgi"; msg: "Attempted

CGI-BIN Access!!";)

A.

Tcpdump filter

B.

IP tables rule

C.

Wire shark filter

D.

Snort rule

Full Access
Question # 45

Launch Calculator (calc.exe). Using PowerShell, retrieve the Calculator Process Information. What is the value of the File Version property?

Hint: The process name of Calculator is calculator

A.

10.1705.12507.0

B.

10.1902.1603.06155

C.

10.0.19041.1

D.

8.1.2017.26587

E.

8.2017.1009.04153

F.

10.1705.1809.07007

G.

8.2017.0908.29102

Full Access
Question # 46

The Windows 'tracert' begins by sending what type of packet to the destination host?

A.

A UDP packet with a TTL of 1

B.

An ICMP Echo Request

C.

An ICMP Router Discovery

D.

An ICMP Echo Reply

Full Access
Question # 47

Which of the following are examples of Issue-Specific policies all organizations should address?

A.

Perimeter filtering guides, break times for employees, desktop neatness and backup procedures.

B.

Rogue wireless access points, auditing, break time for employees and organizational structure.

C.

Audit logs, physical access, mission statements and network protocols used.

D.

Backup requirements, employee monitoring, physical access and acceptable use.

Full Access
Question # 48

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

A.

nice -n 19 cc -c *.c &

B.

nice cc -c *.c &

C.

nice -n -20 cc -c *.c &

D.

nice cc -c *.c

Full Access
Question # 49

Which Authenticates Assurance Level requires a hardware-based authenticates?

A.

AAI1

B.

AAL3

C.

AAL2

Full Access
Question # 50

Which of the following is a backup strategy?

A.

Differential

B.

Integrational

C.

Recursive

D.

Supplemental

Full Access
Question # 51

What does Authentication Header (AH) add to the packet in order to prevent an attacker from lying about the source?

A.

Integrity Check Value

B.

AES-128 encryption

C.

Triple DES encryption

D.

32-bit sequence number

Full Access
Question # 52

Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

A.

The server is not using a well-known port.

B.

The server is on a different network.

C.

The client-side source ports are different.

D.

The clients are on different subnets.

Full Access
Question # 53

In the AGULP model, who should be assigned permissions and privileges?

A.

Universal Groups

B.

Local Groups

C.

Individual User Accounts

D.

Global Groups

Full Access
Question # 54

IPS devices that are classified as "In-line NIDS" devices use a combination of anomaly analysis, signature-based rules, and what else to identify malicious events on the network?

A.

Firewall compatibility rules

B.

Application analysis

C.

ICMP and UDP active scanning

D.

MAC address filtering

Full Access
Question # 55

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

A.

It uses TCP port 443 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It is a protocol used to provide security for a database server in an internal network.

D.

It uses TCP port 80 as the default port.

Full Access
Question # 56

Fill in the blank with the correct answer to complete the statement below.

The permission is the minimum required permission that is necessary for a user to enter a directory and list its contents.

Full Access
Question # 57

Which of the following is a potential WPA3 security issue?

A.

Backward compatibility

B.

Disassociate frame DoS

C.

Traffic decryption with PSK

D.

Short key lengths

Full Access
Question # 58

Which of the following choices accurately describes how PGP works when encrypting email?

A.

PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric key.

B.

PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

C.

PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

D.

PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric key.

Full Access
Question # 59

When designing wireless networks, one strategy to consider is implementing security mechanisms at all layers of the OSI model. Which of the following protection mechanisms would protect layer 1?

A.

Hardening applications

B.

Limit RF coverage

C.

Employing firewalls

D.

Enabling strong encryption

Full Access
Question # 60

You work as a Network Administrator for McNeil Inc. You are installing an application. You want to view the log file whenever a new entry is added to the /var/log/messages log file. Which of the following commands will you use to accomplish this?

A.

TAIL -show /var/log/messages

B.

TAIL -f /var/log/messages

C.

TAIL -50 /var/log/messages

D.

TAIL -view /var/log/messages

Full Access
Question # 61

Which of the following is the FIRST step in performing an Operational Security (OP5EC) Vulnerabilities Assessment?

A.

Assess the threat

B.

Assess vulnerabilities of critical information to the threat

C.

Conduct risk versus benefit analysis

D.

Implement appropriate countermeasures

E.

Identification of critical information

Full Access
Question # 62

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose two.

A.

It reduces the need for globally unique IP addresses.

B.

It allows external network clients access to internal services.

C.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Full Access
Question # 63

Which of the following commands is used to change file access permissions in Linux?

A.

chgrp

B.

chperm

C.

chmod

D.

chown

Full Access
Question # 64

Which practice can help protect secrets in a cloud environment?

A.

Avoiding the use of Terraform variables

B.

Running privileged docker runtime

C.

Excluding the tfstate file from code repositories

D.

Using the -net-host flag

Full Access
Question # 65

Many IIS servers connect to Microsoft SQL databases. Which of the following statements about SQL server security is TRUE?

A.

SQL Server patches are part of the operating system patches.

B.

SQL Server should be installed on the same box as your IIS web server when they communicate as part of the web application.

C.

It is good practice to never use integrated Windows authentication for SQL Server.

D.

It is good practice to not allow users to send raw SQL commands to the SQL Server.

Full Access
Question # 66

What is the first thing that should be done during the containment step of incident handling?

A.

Change all the passwords

B.

Secure the area

C.

Prepare the Jump bag

D.

Notify management

E.

Prepare a report

Full Access
Question # 67

Training an organization on possible phishing attacks would be included under which NIST Framework Core guidelines?

A.

Detect

B.

Identify

C.

Respond

D.

Protect

Full Access
Question # 68

You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?

A.

ls

B.

chroot

C.

route

D.

chdir

Full Access
Question # 69

What dots Office 365 use natively for authentication?

A.

Microsoft CHAP

B.

Exchange Online

C.

Azure Active Directory

D.

Central Authentication Service

E.

Extensible Authentication Protocol

Full Access
Question # 70

Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

A.

Anonymous authentication

B.

Mutual authentication

C.

Open system authentication

D.

Shared key authentication

Full Access
Question # 71

Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP scope on a private LAN?

A.

127.0.0.100

B.

169.254.1.50

C.

10.254.1.50

D.

172.35.1.100

Full Access
Question # 72

Which of the following radio frequencies is used by the IEEE 802.11a wireless network?

A.

3.7 GHz

B.

7.0 GHz

C.

2.4 GHz

D.

5.0 GHz

Full Access
Question # 73

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

A.

IMAP

B.

SNMP

C.

POP3

D.

SMTP

Full Access
Question # 74

Which attack stage mirrors the Information Gathering phase used in penetration testing methodology?

A.

Reconnaissance

B.

Clearing tracks

C.

Scanning

D.

Gaining access

Full Access
Question # 75

What type of attack can be performed against a wireless network using the tool Kismet?

A.

IP spoofing

B.

Eavesdropping

C.

Masquerading

D.

Denial of Service

Full Access
Question # 76

Where are user accounts and passwords stored in a decentralized privilege management environment?

A.

On a central authentication server.

B.

On more than one server.

C.

On each server.

D.

On a server configured for decentralized privilege management.

Full Access
Question # 77

If the NET_ID of the source and destination address in an IP (Internet Protocol) packet match, which answer BEST describes the routing method the sending host will use?

A.

Local (or direct) routing

B.

Circuit switch routing

C.

Dynamic (or changeable) routing

D.

Remote (or indirect) routing

Full Access
Question # 78

What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

A.

Camera Recordings

B.

Security guards

C.

Encryption

D.

Shredding

E.

Corrective Controls

Full Access
Question # 79

When are Group Policy Objects (GPOs) NOT applied automatically to workstations?

A.

At 90-minute intervals

B.

At logon

C.

Every time Windows Explorer is launched

D.

At boot-up

Full Access
Question # 80

Which of the following statements about the authentication concept of information security management is true?

A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

Full Access
Question # 81

What database can provide contact information for Internet domains?

A.

dig

B.

who

C.

who is

D.

ns look up

Full Access
Question # 82

Which type of risk assessment results are typically categorized as low, medium, or high-risk events?

A.

Technical

B.

Qualitative

C.

Management

D.

Quantitative

Full Access
Question # 83

You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:

* they contain only numerals

* they contain only letters

* they contain only special characters

* they contain only letters and numerals

" they contain only letters and special characters

* they contain only numerals and special characters

Of the following, what is the benefit to using this set of tests?

A.

They are focused on cracking passwords that use characters prohibited by the password policy

B.

They find non-compliant passwords without cracking compliant passwords.

C.

They are focused on cracking passwords that meet minimum complexity requirements

D.

They crack compliant and non-compliant passwords to determine whether the current policy is strong enough

Full Access
Question # 84

If Linux server software is a requirement in your production environment which of the following should you NOT utilize?

A.

Debian

B.

Mandrake

C.

Cygwin

D.

Red Hat

Full Access
Question # 85

How is a Distributed Denial of Service (DDOS) attack distinguished from a regular DOS attack?

A.

DDOS attacks are perpetrated by many distributed hosts.

B.

DDOS affects many distributed targets.

C.

Regular DOS focuses on a single router.

D.

DDOS affects the entire Internet.

Full Access
Question # 86

A folder D:\Files\Marketing has the following NTFS permissions:

• Administrators: Full Control

• Marketing: Change and Authenticated

• Users: Read

It has been shared on the server as "MARKETING", with the following share permissions:

• Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

A.

No access

B.

Full Control

C.

Read

D.

Change

Full Access
Question # 87

You are examining an IP packet with a header of 40 bytes in length and the value at byte 0 of the packet header is 6. Which of the following describes this packet?

A.

This is an IPv4 packet; the protocol encapsulated in the payload is unspecified.

B.

This is an IPv4 packet with a TCP payload.

C.

This is an IPv6 packet; the protocol encapsulated in the payload is unspecified.

D.

This is an IPv6 packet with a TCP payload.

Full Access
Question # 88

Which of the following is used to allow or deny access to network resources?

A.

Spoofing

B.

ACL

C.

System hardening

D.

NFS

Full Access
Question # 89

Which of the following tools is also capable of static packet filtering?

A.

netstat.exe

B.

ipsecpol.exe

C.

ipconfig.exe

D.

net.exe

Full Access
Question # 90

What must be added to VLANs to improve security?

A.

Network hubs

B.

Air gaps

C.

Spanning tree interfaces

D.

Access control lists

Full Access
Question # 91

Which of the following access control principles helps prevent collusion and detect abuse of access?

A.

Least privilege

B.

Rotation of duties

C.

Separation of duties

D.

Need to know

Full Access
Question # 92

What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

A.

These attacks work against relatively idle servers.

B.

These attacks rely on a modified TCP/IP stack to function.

C.

These attacks can be easily traced back to the source.

D.

These attacks only work against Linux/Unix hosts.

Full Access
Question # 93

While building multiple virtual machines on a single host operating system, you have determined that each virtual machine needs to work on the network as a separate entity with its own unique IP address on the same logical subnet. You also need to limit each guest operating system to how much system resources it has access to. Which of the following correctly identifies steps that must be taken towards setting up these virtual environments?

A.

The virtual machine software must define a separate virtual network Interface to each virtual machine and then define which unique logical hard drive partition should be available to the guest operating system.

B.

The virtual machine software must define a separate virtual network interface since each system needs to have an IP address on the same logical subnet requiring they use the same physical interface on the host operating system.

C.

The virtual machine software must define a separate virtual network interface to each virtual machine as well as how much RAM should be available to each virtual machine.

D.

The virtual machine software establishes the existence of the guest operating systems and the physical system resources to be used by that system will be configured from within the guest operating system.

E.

The virtual machine software must define a separate physical network interface to each virtual machine so that the guest operating systems can have unique IP addresses and then define how much of the systems RAM is available to the guest operating system.

Full Access
Question # 94

Which of the following Linux commands can change both the username and group name a file belongs to?

A.

chown

B.

chgrp

C.

chmod

D.

newgrp

Full Access
Question # 95

Which of the following tasks is the responsibility of a Linux systems administrator who is deploying hardening scripts to his systems?

A.

Run them immediately after installation and before configuring system services.

B.

Ensure they are automatically run during the default installation of the OS.

C.

Test in a development environment before rolling out to production.

D.

Apply the same script(s) to every Linux host within the enterprise.

Full Access
Question # 96

What protocol is a WAN technology?

A.

802.11

B.

802.3

C.

Ethernet

D.

Frame Relay

Full Access
Question # 97

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain- based network. The network contains ten Windows 2003 member servers, 150 Windows XP Professional client computers. According to the company's security policy, Mark needs to check whether all the computers in the network have all available security updates and shared folders. He also needs to check the file system type on each computer's hard disk. Mark installs and runs MBSACLI.EXE with the appropriate switches on a server. Which of the following tasks will he accomplish?

A.

None of the tasks will be accomplished.

B.

He will be able to check the file system type on each computer's hard disk.

C.

He will be able to accomplish all the tasks.

D.

He will be able to check all available security updates and shared folders.

Full Access
Question # 98

You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company. You have physically installed sensors at all key positions throughout the network such that they all report to the command console.

What will be the key functions of the sensors in such a physical layout?

Each correct answer represents a complete solution. Choose all that apply.

A.

To collect data from operating system logs

B.

To notify the console with an alert if any intrusion is detected

C.

To analyze for known signatures

D.

To collect data from Web servers

Full Access
Question # 99

To update from a Windows Server Update Services (WSUS) server, users of the machine must have what rights, If any?

A.

No user tights are required

B.

Network User

C.

Local User

D.

Local Administrator

Full Access
Question # 100

What is the motivation behind SYN/FIN scanning?

A.

The SYN/FIN combination is useful for signaling to certain Trojans.

B.

SYN/FIN packets are commonly used to launch denial of service attacks against BSD hosts.

C.

The crafted SYN/FIN packet sometimes gets past firewalls and filtering routers.

D.

A SYN/FIN packet is used in session hijacking to take over a session.

Full Access
Question # 101

Which access control mechanism requires a high amount of maintenance since all data must be classified, and all users granted appropriate clearance?

A.

Mandatory

B.

Discretionary

C.

Rule set-based

D.

Role-Based

Full Access
Question # 102

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as.

A.

False negative

B.

False positive

C.

True positive

D.

True negative

Full Access
Question # 103

Which of the following is the reason of using Faraday cage?

A.

To prevent Denial-of-Service (DoS) attack

B.

To prevent shoulder surfing

C.

To prevent mail bombing

D.

To prevent data emanation

Full Access
Question # 104

Which of the following SIP methods is used to setup a new session and add a caller?

A.

ACK

B.

BYE

C.

REGISTER

D.

INVITE

E.

CANCEL

Full Access
Question # 105

SSL session keys are available in which of the following lengths?

A.

40-bit and 128-bit.

B.

64-bit and 128-bit.

C.

128-bit and 1,024-bit.

D.

40-bit and 64-bit.

Full Access
Question # 106

Using PowerShell ISE running as an Administrator, navigate to the

C:\hlindows\security\tevplatesdirectory. Use secedit.exe in analyze mode to compare the temp.sdb and uorkstdtionSecureTmplate.inf files, and output the findings to a file called log.txt. Which configuration setting under Analyze User Rights reports a mismatch?

Hints:

Use files located in the C \windows\security\templates\ directory

The log. txt file will be created in the directory the secedit.exe command is run from

A.

RemoteAccess

B.

•S-l-5-32-544__ Members

C.

Enable Admin Account

D.

UseManger

E.

AuditSystemEvents

F.

AuditDSAccess.

G.

SeSecurityPrivilege

Full Access
Question # 107

What is needed for any of the four options for Azure AD multi-factor user authentication?

A.

Fingerprint reader

B.

Web cam

C.

Phone

D.

Iris scan

Full Access
Question # 108

Which of the following correctly describes a stateless packet filter?

A.

Streams are rebuilt for analysis

B.

Data is passed through unchecked

C.

Packet processing is very slow

D.

Security is verified at the application level

Full Access
Question # 109

Which of the following is NOT a recommended best practice for securing Terminal Services and Remote Desktop?

A.

Require TLS authentication and data encryption whenever possible.

B.

Make sure to allow all TCP 3389 traffic through the external firewall.

C.

Group Policy should be used to lock down the virtual desktops of thin-client users.

D.

Consider using IPSec or a VPN in addition to the RDP encryption if you are concerned about future RDP vulnerabilities.

Full Access
Question # 110

Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

A.

Information centric defense

B.

Uniform information protection

C.

General information protection

D.

Perimeter layering

Full Access
Question # 111

You are examining a packet capture session in Wire shark and see the packet shown in the accompanying image. Based on what you see, what is the appropriate protection against this type of attempted attack?

A.

Block DNS traffic across the router

B.

Disable forwarding of unsolicited TCP requests

C.

Disable IP-directed broadcast requests

D.

Block UDP packets at the firewall

Full Access
Question # 112

Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?

Hints

Hints

• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory. home giac PasswordHashing

- Run Hashcat in straight mod* (flag -a 0) to crack the MD5 hashes (flag -m 500) in the shadow file.

• Use the hash values from the Hashcat output file and the shadow file to match the cracked password with the user name.

• If required, a backup copy of the original files can be found in the shadowbackup directory.

A.

J3@nGr3y

B.

WwBoj25tT7

C.

MsconfiG35

D.

Noregrets2

E.

HowAreWeToday?19

F.

Prometheus

G.

6dWalking8

Full Access
Question # 113

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

A.

The Security ID numbers (SIDs) of all the groups to which you belong

B.

A list of cached authentications

C.

A list of your domain privileges

D.

The Security ID numbers (SIDs) of all authenticated local users

Full Access
Question # 114

In the directory C:\lmages\steer there Is an Image file lmage_4240.png with a data string encoded inside the file. What word is hidden in the file?

A.

pontine

B.

prolific

C.

abysmal

D.

petroleum

E.

mushroom

F.

Chicago

G.

marshmallow

Full Access
Question # 115

Jonny Is an IT Project Manager. He cannot access the folder called "IT Projects" but can access a folder called "Sales Data" even though he's not on the sales team. Which information security principle has failed?

A.

Authentication

B.

Authorization

C.

Identification

D.

Accountability

Full Access