100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GSEC EXAM STUDY QUESTIONS AND ANSWERS GRADED A 2024 $15.49   Add to cart

Exam (elaborations)

GSEC EXAM STUDY QUESTIONS AND ANSWERS GRADED A 2024

 2 views  0 purchase
  • Course
  • GSEC .
  • Institution
  • GSEC .

conceptual design -Correct Answer high level design that includes core components of network architecture | 'black box' I/O | legal, environmental safety | customer experience | multidisciplinary logical design -Correct Answer depicts how data flows across different devices in network | detailed...

[Show more]

Preview 4 out of 65  pages

  • November 11, 2024
  • 65
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • GSEC .
  • GSEC .
avatar-seller
PossibleA
GSEC EXAM



GSEC EXAM STUDY QUESTIONS AND
ANSWERS GRADED A 2024
conceptual design -Correct Answer ✔high level design that includes core components
of network architecture | 'black box' I/O | legal, environmental safety | customer
experience | multidisciplinary

logical design -Correct Answer ✔depicts how data flows across different devices in
network | detailed, rather than abstract network diagram | services, application names |
for developers and security architects | shows servers workstations routers firewalls...

physical design -Correct Answer ✔last before implementation | all known details |
physical components and connections | OS versions

communications flow -Correct Answer ✔dictated by logical design, shows how data
flows in and out of the network | informs threat model; attack surface and vectors;
estimate impact; determines defense

intellectual property (IP) -Correct Answer ✔dictated by logical architecture | key is
reduce number or locations where present; subject to copyright

router -Correct Answer ✔device that connects different networks together internal and
external | forwards data packets between computer networks | operates at OSI L3,
handles packets

switch -Correct Answer ✔networking device that connects computers together to form
physical and virtual networks | handles frames at OSI L2

Kismet -Correct Answer ✔Linux WLAN sniffer completely passive used for vulnerability
assessment and intrusion detection

threat enumeration -Correct Answer ✔list threat agents | list attack methods | list
system-level objectives

threat agents (3) -Correct Answer ✔human or not | organized crime | espionage |
hactivist

Advanced Persistent Threat (APT) -Correct Answer ✔An organized group of attackers
who are highly motivated, skilled, and patient. They are often sponsored by a
government, are focused on a specific target, and will continue attacking for a very long
time until they achieve their goal.




GSEC EXAM

,GSEC EXAM


DoS -Correct Answer ✔An availability attack, to consume resources to the point of
exhaustion; Denial of Service; flood of ICMP requests targets router takes down server

DDoS -Correct Answer ✔Denial of service attack committed using many computers,
usually zombies on a botnet.

packet sniffing -Correct Answer ✔capture network traffic for analysis | no longer
requires physical access to network due to prevalence of wifi

packet misroute -Correct Answer ✔malware on router sends traffic to evil location or
causes routing loops DoS or network congestion

XSS -Correct Answer ✔Cross-site scripting. Attacker redirects users to malicious
websites, steal cookies. E-mail can include an embedded HTML image object or a
JavaScript image tag as part of a malicious cross-site scripting attack. Prevent with
input validation.

CSRF -Correct Answer ✔Cross-Site Request Forgery--Third-party redirect of static
content within the security context of a trusted site.

SYN flood -Correct Answer ✔A type of DoS where an attacker sends a large amount of
SYN request packets to a server in an attempt to deny service.

TCP reset -Correct Answer ✔attacker sniffs target traffic the spoofs packet with RST
flag set to end session

routing table poisoning -Correct Answer ✔routers exchange data to build tables;
attacker injects bad data

CDP -Correct Answer ✔Cisco Discovery Protocol; transmits in the clear; manipulation
attack; disable this protocol

MAC flood -Correct Answer ✔An attack that sends numerous packets to the switch,
each of which has a different source MAC address, in an attempt to use up the memory
on the switch and switch can downgrade to hub

DHCP spoofing attack -Correct Answer ✔MitM attack listens for DHCP traffic then
sends attacker IP address as default gateway

STP -Correct Answer ✔Spanning Tree Protocol. Protocol enabled on most switches that
protects against switching loops. A switching loop can be caused if two ports of a switch
are connected together, such as those caused when two ports of a switch are
connected together.




GSEC EXAM

,GSEC EXAM


VLAN hop -Correct Answer ✔spoof 802.1Q tags, attacker can frames to diff VLAN w/o
router

physical topology -Correct Answer ✔how a network is wired together; includes wifi

ethernet -Correct Answer ✔a system for connecting a number of computer systems to
form a local area network, with protocols to control the passing of information and to
avoid simultaneous transmission by two or more systems.

full duplex -Correct Answer ✔simultaneous send / receive for two nodes; Any device
that can send and receive data simultaneously.

CSMA / CD -Correct Answer ✔Carrier Sense Multiple Access with Collision Detection. It
is the method for multiple hosts to communicate on a Ethernet.

subnet -Correct Answer ✔A logical subset of a larger network, created by an
administrator to improve network performance or to provide security.

Principle of Least Privilege -Correct Answer ✔A security discipline that requires that a
particular user, system, or application be given no more privilege than necessary to
perform its function or job.

protected enclave -Correct Answer ✔segment of internal network defined by common
security policies

SDN -Correct Answer ✔Software Defined Network | split network into subnets with
software | allows for micro-segmentation and traffic analysis between two endpoints

public internet -Correct Answer ✔publicly accessible system of networks that connects
computers around the world

semi-public internet -Correct Answer ✔reachable from internet; may have internet
access

middleware -Correct Answer ✔separate private DMZ from private network

private internet -Correct Answer ✔used exclusively within an organization is called an

DMZ -Correct Answer ✔A network between the internal network and the Internet with a
firewall on both sides.

border router -Correct Answer ✔between ISP and org firewall; prefilters traffic before
org firewall and uses and ACL; aka edge router



GSEC EXAM

, GSEC EXAM


application-level virtual machine -Correct Answer ✔run an app on its own VM so if
compromised cannot compromise other systems

OS virtual machine -Correct Answer ✔multiple operating systems run independently on
the same hardware

virtualization -Correct Answer ✔emulation software for virtualization| allows a single
computing device to run multiple operating systems through hardware emulation |
accesses virtualized hardware, not physical

hypervisor -Correct Answer ✔emulation software for virtualization; allows a single
computing device to run multiple operating systems through hardware emulation

VM escapes -Correct Answer ✔attack to escape guest OS compromise hypervisor

virtual machine introspection -Correct Answer ✔monitor hypervisor and all VMs

virtual sprawl -Correct Answer ✔number of VMs / guest systems too big to manage

air gap -Correct Answer ✔physical separation of hardware (servers)

DMA -Correct Answer ✔Direct memory access (DMA) is a feature which allows for the
accessing of memory and controllers (video and network cards), without utilizing the
CPU such

hyperjacking -Correct Answer ✔compromise the hypervisor to gain access to the VMs
and their data typically launched against type 2 hypervisors that run over a host OS

hyperjumping -Correct Answer ✔attacker compromises one guest OS and jumps to
another | lateral compromise

rowhammer -Correct Answer ✔hardware exploit; escalate privileges, escape VM,
flipping bits in memory

blue pill -Correct Answer ✔logical exploit; create false hypervisor with root access

type 1 hypervisor -Correct Answer ✔bare metal hypervisor it is a software program that
acts as an operating system and also provides the ability to perform virtualization of
other operating systems using the same computer (e.g. Hyper V)

type 2 hypervisor -Correct Answer ✔Software to manage virtual machines that is
installed as an application in an operating system. (e.g. Virtual Box)

content discovery -Correct Answer ✔monitor data for restricted info


GSEC EXAM

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller PossibleA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81298 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.49
  • (0)
  Add to cart