GSEC Prep Exam Study Guide Questions and Answers GRADED A
2 views 0 purchase
Module
GSEC Prep
Institution
GSEC Prep
During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)? -Correct Answer Initialization
Which of the following protocols work at the Session layer of the OSI model? -Correct Answer Internet Security Association and Key Management Protocol ...
GSEC Prep Exam Study Guide Questions and
Answers 2024-2028 GRADED A
During which of the following steps is the public/private key-pair generated for Public
Key Infrastructure (PKI)? -Correct Answer ✔Initialization
Which of the following protocols work at the Session layer of the OSI model? -Correct
Answer ✔Internet Security Association and Key Management Protocol (ISAKMP) &
Border Gateway Multicast Protocol (BGMP)
What is a security advantage of using elastic containers for application deployment? -
Correct Answer ✔Footholds disappear
Which of the following statements about DMZ are true? -Correct Answer ✔It contains
company resources that are available on the Internet, such as Web servers and FTP
servers. & It is the boundary between the Internet and a private network.
How many phases does IKE have? -Correct Answer ✔Two
Which of the following should be implemented to protect an organization from spam? -
Correct Answer ✔E-mail filtering
You are going to upgrade your hard disk's file system from FAT to NTFS. What are the
major advantages of the NTFS file system over FAT16 and FAT32 file systems? -
Correct Answer ✔NTFS give improved disk compression than FAT16 and FAT32. NTFS
gives better file security than FAT16 and FAT32. NTFS file system supports for larger
hard disks.
Which of the following is a term that refers to unsolicited e-mails sent to a large number
of e-mail users? -Correct Answer ✔Spam
Which of these would be a common persistence vector? -Correct Answer ✔Registry key
Which of the following statements about buffer overflow is true? -Correct Answer ✔It is
a condition in which an application receives more data than it is configured to accept.
You are responsible for a Microsoft based network. Your servers are all clustered.
Which of the following are the likely reasons for the clustering? -Correct Answer ✔Load
Balancing & Failover
What essential actions would you perform to harden a system? -Correct Answer
✔Restrict permissions, reduce packages installed, and limit services
GSEC Prep EXAM
, GSEC Prep EXAM
You are writing a backup plan. Your goal is to try to ensure you have speed to recovery,
but also to reduce the amount of storage space needed for the backups as much as
possible. Which backup scheme would you choose? -Correct Answer ✔Full backups
weekly; differential backup nightly afterward
Which of the following files contains the shadowed password entries in Linux? -Correct
Answer ✔/etc/shadow
Which of the following features of Windows 7 allows an administrator to both passively
review installed software and configure policies to prevent out-of-date or insecure
software from running? -Correct Answer ✔App Locker
There are three key factors in selecting a biometric mechanism. What are they? -
Correct Answer ✔Reliability, user acceptance, and cost
You have been hired to design a TCP/IP-based network that will contain both Unix and
Windows computers. You are planning a name resolution strategy. Which of the
following services will best suit the requirements of the network? -Correct Answer
✔DNS
Which of the following Linux commands can change both the username and group
name a file belongs to? -Correct Answer ✔chgrp
Which of the following protocols provides maintenance and error reporting function? -
Correct Answer ✔ICMP
In addition to securing the operating system of production honey pot hosts, what is
recommended to prevent the honey pots from assuming the identities of production
systems that could result in the denial of service for legitimate users? -Correct Answer
✔Deploy the honey pot hosts in an unused part of your address space.
Microsoft Windows file security permissions are an example of what? -Correct Answer
✔DAC
In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23
indicate? -Correct Answer ✔The number of bits in the network portion of the address
What would be a common role for a CSIRT within an organization? -Correct Answer
✔Provide oversight and coordination
When discussing access controls, which of the following terms describes the process of
determining the activities or functions that an Individual is permitted to perform? -
Correct Answer ✔Authorization
GSEC Prep EXAM
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller PossibleA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £12.20. You're not tied to anything after your purchase.