[Free] 2017(Sep) EnsurePass Braindumps GIAC GSEC Dumps with VCE and PDF 121-130

EnsurePass
2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSEC.html

GIAC Security Essentials

Question No: 121

What file instructs programs like Web spiders NOT to search certain areas of a site?

  1. Robots.txt

  2. Restricted.txt

  3. Spider.txt

  4. Search.txt

Answer: A

Question No: 122

A new data center is being built where customer credit information will be processed and stored. Which of the following actions will help maintain the confidentiality of the data?

  1. Environmental sensors in the server room

  2. Access control system for physical building

  3. Automated fire detection and control systems

  4. Frequent off-site backup of critical databases

Answer: B

Question No: 123

What defensive measure could have been taken that would have protected the confidentiality of files that were divulged by systems that were compromised by malware?

  1. Ingress filtering at the host level

  2. Monitoring for abnormal traffic flow

  3. Installing file integrity monitoring software

  4. Encrypting the files locally when not in use

Answer: D

Question No: 124

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails. Which of the following will you use to accomplish this?

  1. PPTP

  2. IPSec

  3. PGP

  4. NTFS

Answer: C

Question No: 125

Which of the following proxy servers provides administrative controls over the content?

  1. Content filtering web proxy server

  2. Caching proxy server

  3. Forced proxy server

  4. Web proxy server

Answer: A

Question No: 126

If the NET_ID of the source and destination address in an IP (Internet Protocol) packet match, which answer BEST describes the routing method the sending host will use?

  1. Local (or direct) routing

  2. Circuit switch routing

  3. Dynamic (or changeable) routing

  4. Remote (or indirect) routing

Answer: A

Question No: 127

Which of the following attack vectors are addressed by Xinetd and TCP Wrappers?

  1. Outsider attack from network

  2. Outsider attack from a telephone

  3. Insider attack from local network

  4. Attack from previously installed malicious code

  5. A and B

  6. A and C

  7. B and D

  8. C and D

Answer: B

Question No: 128

Who is responsible for deciding the appropriate classification level for data within an organization?

  1. Data custodian

  2. Security auditor

  3. End user

  4. Data owner

Answer: B

Question No: 129

The TTL can be found in which protocol header?

  1. It is found in byte 8 of the ICMP header.

  2. It is found in byte 8 of the IP header.

  3. It is found in byte 8 of the TCP header.

  4. It is found in byte 8 of the DNS header.

Answer: B

Question No: 130

What is SSL primarily used to protect you against?

  1. Session modification

  2. SQL injection

  3. Third-patty sniffing

  4. Cross site scripting

Answer: C

100% Free Download!
Download Free Demo:GSEC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSEC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE