This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ] Export date:Sat Apr 5 22:21:54 2025 / +0000 GMT ___________________________________________________ Title: [Q150-Q170] Pass GSEC Exam in First Attempt Guaranteed 100% Cover Real Exam Questions [Dec-2023] --------------------------------------------------- Pass GSEC Exam in First Attempt Guaranteed 100% Cover Real Exam Questions [Dec-2023] Valid GSEC test answers & GIAC GSEC exam pdf Q150. The Windows ‘tracert’ begins by sending what type of packet to the destination host?  A UDP packet with a TTL of 1  An ICMP Echo Request  An ICMP Router Discovery  An ICMP Echo Reply Q151. How is a Distributed Denial of Service (DDOS) attack distinguished from a regular DOS attack?  DDOS attacks are perpetrated by many distributed hosts.  DDOS affects many distributed targets.  Regular DOS focuses on a single router.  DDOS affects the entire Internet. Q152. Which of the following network topologies is the most fault tolerant?  Bus  Ring  Star  Mesh Q153. SSL session keys are available in which of the following lengths?  40-bit and 128-bit.  64-bit and 128-bit.  128-bit and 1,024-bit.  40-bit and 64-bit. Q154. You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?  NETSTAT -s  NBTSTAT -s  NBTSTAT -n  NETSTAT -n Q155. Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration? Each correct answer represents a part of the solution. Choose two.  Encryption for the local files stored on the two servers  Highest possible encryption for traffic between the offices  Mutual authentication between the two servers  Extra bandwidth on the Internet connection Q156. If a DNS client wants to look up the IP address for good.news.com and does not receive an authoritative reply from its local DNS server, which name server is most likely to provide an authoritative reply?  The news.com domain name server  The .com (top-level) domain name server  The .(root-level) domain name server  The .gov (top-level) domain name server Q157. Which asymmetric algorithm is used only for key exchange?  EI Gamal  Diffuse-H an  ECC  DSA Q158. Which of the following statements about DMZ are true? Each correct answer represents a complete solution. Choose two.  It is the boundary between the Internet and a private network.  It is an anti-virus software that scans the incoming traffic on an internal network.  It contains company resources that are available on the Internet, such as Web servers and FTP servers.  It contains an access control list (ACL). Q159. What file instructs programs like Web spiders NOT to search certain areas of a site?  Robots.txt  Restricted.txt  Spider.txt  Search.txt Q160. How often is session information sent to the web server from the browser once the session information has been established?  With any change in session data  With every subsequent request  With any hidden form element data  With the initial request to register the session Q161. When should you create the initial database for a Linux file integrity checker?  Before a system is patched  After a system has been compromised  Before a system has been compromised  During an attack Q162. You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company’s network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?  Take a full backup daily with the previous night’s tape taken offsite.  Take a full backup daily and use six-tape rotation.  Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday’s backup offsite.  Take a full backup on alternate days and keep rotating the tapes.  Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday’s backup offsite.  Take a full backup daily with one tape taken offsite weekly. Q163. When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?A, The packets are probably corrupted.B, The packets may have been accidentally routed onto the Internet.C, The packets may be deliberately spoofed by an attacker.D, The packets are a sign of excess fragmentation.  A and B  B and C  B and D  A and D Q164. Which of the following TCP packet flags indicates that host should IMMEDIATELY terminate the connection containing the packet?  FIN  URG  SYN  RST Q165. What would the file permission example “rwsr-sr-x” translate to in absolute mode?  1755  6755  6645  1644 Q166. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company’s network. Which of the following encryption types will Linux use?  MSCHAP  RC2  3DES  CHAP Q167. Which of the following commands generates or assigns a random password to a user account in a Linux computer?  PWCONV  CHMOD  PASSWD  MKPASSWD Q168. Your IT security team is responding to a denial of service attack against your server. They have taken measures to block offending IP addresses. Which type of threat control is this?  Detective  Preventive  Responsive  Corrective Q169. What type of attack can be performed against a wireless network using the tool Kismet?  IP spoofing  Eavesdropping  Masquerading  Denial of Service Q170. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?Each correct answer represents a complete solution. Choose all that apply.  usermod -s  chage  usermod -u  useradd -s  Loading … GSEC Exam Questions – Valid GSEC Dumps Pdf: https://www.braindumpsit.com/GSEC_real-exam.html --------------------------------------------------- Images: https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-12-05 13:35:25 Post date GMT: 2023-12-05 13:35:25 Post modified date: 2023-12-05 13:35:25 Post modified date GMT: 2023-12-05 13:35:25