[Free] 2017(Sep) EnsurePass Braindumps GIAC GSEC Dumps with VCE and PDF 131-140

EnsurePass
2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSEC.html

GIAC Security Essentials

Question No: 131

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

  1. The Security ID numbers (SIDs) of all the groups to which you belong

  2. A list of cached authentications

  3. A list of your domain privileges

  4. The Security ID numbers (SIDs) of all authenticated local users

Answer: C

Question No: 132

You work as an Administrator for McRoberts Inc. The company has a Linux-based network. You are logged in as a non-root user on your client computer. You want to delete all files from the /garbage directory. You want that the command you will use should prompt for the root user password. Which of the following commands will you use to accomplish the task?

  1. rm -rf /garbage*

  2. del /garbage/*.*

  3. rm -rf /garbage* /SU

  4. su -c quot;RM -rf /garbage*quot;

Answer: D

Question No: 133

It is possible to sniff traffic from other hosts on a switched Ethernet network by impersonating which type of network device?

  1. Switch

  2. Bridge

  3. Hub

  4. Router

Answer: D

Question No: 134

Which of the following SIP methods is used to setup a new session and add a caller?

  1. ACK

  2. BYE

  3. REGISTER

  4. INVITE

  5. CANCEL

Answer: D

Question No: 135

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP#39;s cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

  1. Blowfish

  2. DES

  3. SHA-l

  4. Cast

Answer: C

Question No: 136

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

  1. Host-based intrusion detection system (HIDS)

  2. Client-based intrusion detection system (CIDS)

  3. Server-based intrusion detection system (SIDS)

  4. Network intrusion detection system (NIDS)

Answer: A,D

Question No: 137

One of your Linux systems was compromised last night. According to change management history and a recent vulnerability scan, the system#39;s patches were up-to-date at the time of the attack. Which of the following statements is the Most Likely explanation?

  1. It was a zero-day exploit.

  2. It was a Trojan Horse exploit.

  3. It was a worm exploit.

  4. It was a man-in-middle exploit.

Answer: A

Question No: 138

Which class of IDS events occur when the IDS fails to alert on malicious data?

  1. True Negative

  2. True Positive

  3. False Positive

  4. False Negative

Answer: D

Question No: 139

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

  1. netstat -a | grep FTP

  2. FTP netstat -r

  3. FTP netstat -a

  4. netstat -r | grep FTP

Answer: A

Question No: 140

Which of the following best describes the level of risk associated with using proprietary crypto algorithms.?

  1. Proprietary cryptographic algorithms are required by law to use shorter key lengths in the United States, so the risk is high.

  2. Proprietary algorithms have not been subjected to public scrutiny, so they have been checked less throughly for vulnerabilities.

  3. Proprietary algorithms are less likely be vulnerable than algorithms that have been publicly disclosed because of enhanced secrecy of the algorithm.

  4. Proprietary algorithms are not known to generally be any more or less vulnerable than publicly scrutinized algorithms.

Answer: B

100% Free Download!
Download Free Demo:GSEC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSEC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE