[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSEC Dumps with VCE and PDF 111-120

CollectDumps 2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Essentials

Question No: 111

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?

Each correct answer represents a complete solution. Choose two.

  1. The client can optionally authenticate the server.

  2. The client always authenticates the server.

  3. The server always authenticates the client.

  4. The server can optionally authenticate the client.

Answer: B,D

Question No: 112

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux- based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

  1. killall

  2. ps

  3. getpid

  4. kill

Answer: B

Question No: 113

Which of the following is more commonly used for establishing high-speed backbones that interconnect smaller networks and can carry signals over significant distances?

  1. Bluetooth

  2. Ethernet

  3. Token ring

  4. Asynchronous Transfer Mode (ATM)

Answer: D

Question No: 114

Which of the following describes software technologies that improve portability, manageability, and compatibility of applications by encapsulating them from the underlying operating system on which they are executed?

  1. System registry

  2. Group Policy

  3. Application virtualization

  4. System control

Answer: C

Question No: 115

An attacker gained physical access to an internal computer to access company proprietary data. The facility is protected by a fingerprint biometric system that records both failed and successful entry attempts. No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?

  1. Try raising the Crossover Error Rate (CER)

  2. Try to lower the False Accept Rate (FAR)

  3. Try setting the Equal Error Rate (EER) to zero

  4. Try to set a lower False Reject Rate (FRR)

Answer: B

Question No: 116

When discussing access controls, which of the following terms describes the process of determining the activities or functions that an Individual is permitted to perform?

  1. Authentication

  2. Identification

  3. Authorization

  4. Validation

Answer: C

Question No: 117

You work as a Linux technician for Tech Perfect Inc. You have lost the password of the root. You want to provide a new password. Which of the following steps will you take to accomplish the task?

  1. The password of the root user cannot be changed.

  2. Use the PASSWD root command. Reboot the computer.

  3. Reboot the computer in run level 0. Use INIT=/bin/sh as a boot option. At the bash# prompt, run the PASSWD root command.

  4. Reboot the computer in run level 1. Use INIT=/bin/sh as a boot option.

At the bash# prompt, run the PASSWD root command.

Answer: D

Question No: 118

Which of the following networking topologies uses a hub to connect computers?

  1. Bus

  2. Ring

  3. Star

  4. Cycle

Answer: C

Question No: 119

Which of the following should be implemented to protect an organization from spam?

  1. Auditing

  2. System hardening

  3. E-mail filtering

  4. Packet filtering

Answer: C

Question No: 120

Which of the following statements would describe the term quot;incidentquot; when used in the branch of security known as Incident Handling?

  1. Any observable network event

  2. Harm to systems

  3. Significant threat of harm to systems

  4. A and C

  5. A, B, and C

  6. B and C

  7. A and B

Answer: D

100% Free Download!
Download Free Demo:GSEC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSEC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE