100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GFACT Certification 2024 Exam Questions And Correct Answers R199,49   Add to cart

Exam (elaborations)

GFACT Certification 2024 Exam Questions And Correct Answers

 8 views  0 purchase
  • Course
  • GFACT Certification
  • Institution
  • GFACT Certification

GFACT Certification 2024 Exam Questions And Correct Answers • A GIAC administrator has configured their company's web server to send an X-Frame-Options header in every request to an HTTP page. The admin has configured the option to use the values DENY,SAMEORGIN, or ALLOW-FROM. What attac...

Preview 3 out of 27  pages

  • September 23, 2024
  • 27
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • GFACT Certification
  • GFACT Certification
avatar-seller
A GIAC administrator has configured their company's web server to send an X-Frame-
Options header in every request to an HTTP page. The admin has configured the option
to use the values DENY,SAMEORGIN, or ALLOW-FROM.
What attack is the administrator addressing with the techniques described above?

A) SQL injection
B) Cross-Site request forgery
C) Cross-Site scripting
D) Directory traversal
E) Clickjacking - Answer-Clickjacking

/.A Red Team would use the following command for which purposes?

# nmap -vv -sS -p- 10.10.1.1

A) Identifying open ports that could be used to compromise a host
B) Determining updates needed for the host's asset inventory record
C) Identifying unauthorized open ports to disable on the host
D) Determining version information for services running on the host - Answer-Identifying
open ports that could be used to compromise a host

/.A security analyst tells an investigator that they know a specific employee sent a
message leaking proprietary information because of the type of encryption used by that
employee to protect it. What feature of encryption provides the analyst with this certainty
that this employee sent the message?

A) Non-repudiation
B) Confidentiality
C) Integrity
D) Availability - Answer-Non-repudiation

/.A user adds a new directory to a Linux system's $PATH environment variable, #export
$PATH=$PATH:new_dir. What action will cause the updated $PATH variable change
back to the original value?

A)Closing and re-opening the terminal
B)Running the command "rm $PATH"
C) Echoing the $PATH to /dev/null - Answer-Closing and reopening the terminal

,/.A Web application is configured to validate a unique token value for each submitted
user request. What threat is being mitigated?

A) Local file inclusion
B) Cross site request forgery
C) Drive-by downloads
D) Command injection - Answer-Cross site request forgery

/.A web application is configured to validate a unique token value for each submitted
user request. What threat is being mitigated?

A)Local file inclusion
B) Cross Site request forgery
C)Drive-By downloads
D) Command injection - Answer-Cross Site request forgery

/.An administrator types the following command:

\\fileserver2\network_tools\software$

What are they trying to access?

A) A remote Registry Key
B) A website uniform resource locator
C) A local drive mapping
D) A hidden share on a remote host - Answer-A hidden share on a remote host

/.An alert indicates that a compromised host was used by an attacker to run the
command below. What was the attacker attempting to do?

$ nmap -sS 192.168.10.0/24

A)Map a network drive to a remote host
B)Identify services running on network hosts
C)Execute a script on a remote host
D)Send Spoofed packets to network hosts - Answer-Identify services running on
network hosts

/.An attacker enters "cat /etc/passwd" into an input field on a website. Which flaw would
allow the input to be executed by the web server's operating system?

A) SQL injection
B) Directory traversal
C)Command Injection
D)Cross-Site Scripting - Answer-Command injection

, /.An incident handler has determined that malware is launching with local Administrator
privileges when the compromised hosts starts and persists with each reboot. Which
location should the incident handler check for this type of malware?

A) C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
B) C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup
C) HKLM\System\CurrentControlSet\Services - Answer-
HKLM\System\CurrentControlSet\Services

/.Code management platforms use pull requests for which purpose?

A) Requesting access to a public repository
B) Pulling main code into a branch
C) Real-Time change tracking in a branch
D) Integrating a branch into the main code - Answer-Integrating a branch into the main
code

/.Consider the TCP communication between two computers shown below. What will
computer A do following Computer B's response?

Computer A sends 20 bytes of data
Computer B responds with Computer A's acknowledgment number + 15

A)Send a FIN packet to close the connection
B) Send the missing five bytes
C)Resend the entire packet
D)Ask computer B what bytes are missing - Answer-Resend the entire packet

/.During which stage of incident response should the adequacy of policies be
examined?

A) Lessons learned
B) Eradication
C) Recovery - Answer-Lessons Learned

/.Examine the list from a Python program below. Which statement will display Oregon?

PNW_states = [ 'Washington' , 'Oregon' , 'Idaho' , 'Montana' , 'Wyoming' ]

A) print(PNW_states[2])
B) print(PNW_states(2))
C) print(PNW_states[1])
D) print(PNW_states[0][2]) - Answer-print(PNW_states[1])

/.How do prepared statements help prevent SQL injection attacks?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller kartelodoc. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R199,49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

84146 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling
R199,49
  • (0)
  Buy now