[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSEC Dumps with VCE and PDF 171-180

CollectDumps 2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSEC.html

GIAC Security Essentials

Question No: 171

Which of the following tools is also capable of static packet filtering?

  1. netstat.exe

  2. ipsecpol.exe

  3. ipconfig.exe

  4. net.exe

Answer: B

Question No: 172

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

  1. TCP port 443

  2. UDP port 161

  3. TCP port 110

  4. UDP port 1701

Answer: D

Question No: 173

What is the first thing that should be done during the containment step of incident handling?

  1. Change all the passwords

  2. Secure the area

  3. Prepare the Jump bag

  4. Notify management

  5. Prepare a report

Answer: B

Question No: 174

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux- based network. You are required to search for the error messages in the /var/log/messages log file. Which of the following commands will you use to accomplish this?

  1. ps /var/log/messages

  2. cat /var/log/messages | look error

  3. cat /var/log/messages | grep error

  4. cat /var/log/messages

Answer: C

Question No: 175

An employee is currently logged into the corporate web server, without permission. You log into the web server as #39;adminquot; and look for the employee#39;s username: quot;dmaulquot; using the quot;whoquot; command. This is what you get back:

Collectdumps 2017 PDF and VCE

  1. The contents of the /var/log/messages file has been altered

  2. The contents of the bash history file has been altered

  3. The contents of the utmp file has been altered

  4. The contents of the http logs have been altered

Answer: B

Question No: 176

Which of the following applications cannot proactively detect anomalies related to a computer?

  1. Firewall installed on the computer

  2. NIDS

  3. HIDS

  4. Anti-virus scanner

Answer: B

Question No: 177

You work as a Network Administrator for Rick International. The company has a TCP/IP- based network. A user named Kevin wants to set an SSH terminal at home to connect to the company#39;s network. You have to configure your company#39;s router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A. 443

  1. 22

  2. 21

  3. 80

Answer: B

Question No: 178

What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

  1. These attacks work against relatively idle servers.

  2. These attacks rely on a modified TCP/IP stack to function.

  3. These attacks can be easily traced back to the source.

  4. These attacks only work against Linux/Unix hosts.

Answer: A

Question No: 179

Which access control mechanism requires a high amount of maintenance since all data must be classified, and all users granted appropriate clearance?

  1. Mandatory

  2. Discretionary

  3. Rule set-based

  4. Role-Based

Answer: A

Question No: 180

What is the name of the command-line tool for Windows that can be used to manage audit policies on remote systems?

  1. SECEDTT.EXE

  2. POLCLI.EXE

  3. REMOTEAUDIT.EXE

  4. AUDITPOL.EXE

Answer: D

100% Free Download!
Download Free Demo:GSEC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSEC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE