100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GSEC Final Exam Prep Questions & Answers. $11.99   Add to cart

Exam (elaborations)

GSEC Final Exam Prep Questions & Answers.

 0 view  0 purchase
  • Course
  • GSEC
  • Institution
  • GSEC

GSEC Final Exam Prep Questions & Answers. During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)? - CORRECT ANSWER Initialization Which of the following protocols work at the Session layer of the OSI model? - CORRECT ANSWER Internet Se...

[Show more]

Preview 2 out of 14  pages

  • November 18, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • gsec
  • GSEC
  • GSEC
avatar-seller
Nursewendo
GSEC Final Exam Prep Questions &
Answers.
During which of the following steps is the public/private key-pair generated for Public Key Infrastructure
(PKI)? - CORRECT ANSWER Initialization



Which of the following protocols work at the Session layer of the OSI model? - CORRECT ANSWER
Internet Security Association and Key Management Protocol (ISAKMP) & Border Gateway Multicast
Protocol (BGMP)



What is a security advantage of using elastic containers for application deployment? - CORRECT ANSWER
Footholds disappear



Which of the following statements about DMZ are true? - CORRECT ANSWER It contains company
resources that are available on the Internet, such as Web servers and FTP servers. & It is the boundary
between the Internet and a private network.



How many phases does IKE have? - CORRECT ANSWER Two



Which of the following should be implemented to protect an organization from spam? - CORRECT
ANSWER E-mail filtering



You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages
of the NTFS file system over FAT16 and FAT32 file systems? - CORRECT ANSWER NTFS give improved disk
compression than FAT16 and FAT32. NTFS gives better file security than FAT16 and FAT32. NTFS file
system supports for larger hard disks.



Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?
- CORRECT ANSWER Spam



Which of these would be a common persistence vector? - CORRECT ANSWER Registry key

, Which of the following statements about buffer overflow is true? - CORRECT ANSWER It is a condition in
which an application receives more data than it is configured to accept.



You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following
are the likely reasons for the clustering? - CORRECT ANSWER Load Balancing & Failover



What essential actions would you perform to harden a system? - CORRECT ANSWER Restrict
permissions, reduce packages installed, and limit services



You are writing a backup plan. Your goal is to try to ensure you have speed to recovery, but also to
reduce the amount of storage space needed for the backups as much as possible. Which backup scheme
would you choose? - CORRECT ANSWER Full backups weekly; differential backup nightly afterward



Which of the following files contains the shadowed password entries in Linux? - CORRECT ANSWER
/etc/shadow



Which of the following features of Windows 7 allows an administrator to both passively review installed
software and configure policies to prevent out-of-date or insecure software from running? - CORRECT
ANSWER App Locker



There are three key factors in selecting a biometric mechanism. What are they? - CORRECT ANSWER
Reliability, user acceptance, and cost



You have been hired to design a TCP/IP-based network that will contain both Unix and Windows
computers. You are planning a name resolution strategy. Which of the following services will best suit
the requirements of the network? - CORRECT ANSWER DNS



Which of the following Linux commands can change both the username and group name a file belongs
to? - CORRECT ANSWER chgrp



Which of the following protocols provides maintenance and error reporting function? - CORRECT
ANSWER ICMP

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursewendo. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart