[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSEC Dumps with VCE and PDF 61-70

CollectDumps 2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSEC.html

GIAC Security Essentials

Question No: 61

A folder D:\Files\Marketing has the following NTFS permissions:

  • Administrators: Full Control

  • Marketing: Change and Authenticated

  • Users: Read

    It has been shared on the server as quot;MARKETINGquot;, with the following share permissions:

  • Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

  1. No access

  2. Full Control

  3. Read

  4. Change

Answer: C

Question No: 62

Which of the following SIP INVITE lines indicates to the remote registrar the VoIP phone that initiated the call?

  1. Via

  2. To

  3. From-Agent

  4. User-Agent

Answer: D

Question No: 63

What is the following sequence of packets demonstrating?

  1. telnet.com.telnet gt; client.com.38060: F 4289:4289(0) ack 92 win 1024

  2. client.com.38060 gt; telnet.com.telnet: .ack 4290 win 8760 (DF)

  3. client.com.38060 gt; telnet.com.telnet: F 92:92(0) ack 4290 win 8760 (DF)

  4. telnet.com.telnet gt; client.com.38060: .ack 93 win 1024

Answer: C

Question No: 64

When an IIS filename extension is mapped, what does this mean?

  1. Files with the mapped extensions cannot be interpreted by the web server.

  2. The file and all the data from the browser#39;s request are handed off to the mapped interpreter.

  3. The files with the mapped extensions are interpreted by CMD.EXE.

  4. The files with the mapped extensions are interpreted by the web browser.

Answer: B

Question No: 65

The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a

useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?

  1. The apt-get upgrade command doesn#39;t work with the cron command because of incompatibility

  2. Relying on vendor and 3rd party email lists enables updates via email, for even faster patching

  3. Automated patching of production servers without prior testing may result in unexpected behavior or failures

  4. The command apt-get upgrade is incorrect, you need to run the apt-get update command

Answer: D

Question No: 66

Which of the following would be a valid reason to use a Windows workgroup?

  1. Lower initial cost

  2. Simplicity of single sign-on

  3. Centralized control

  4. Consistent permissions and rights

Answer: D

Question No: 67

You are an Intrusion Detection Analyst and the system has alerted you to an Event of Interest (EOI) that appears to be activity generated by a worm. You investigate and find that the network traffic was normal. How would this type of alert be categorized?

  1. False Positive

  2. True Negative

  3. True Positive

  4. False Negative

Answer: A

Question No: 68

Which of the following heights of fence deters only casual trespassers?

  1. 8 feet

  2. 2 to 2.5 feet

  3. 6 to 7 feet

  4. 3 to 4 feet

Answer: D

Question No: 69

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

  1. rm private.txt #11 Nov 2009 02:59:58 am

  2. touch -d quot;11 Nov 2009 02:59:58 amquot; private.txt

  3. touch private.txt #11 Nov 2009 02:59:58 am

  4. touch -t 200911110259.58 private.txt

Answer: B,D

Question No: 70

What would the following IP tables command do? IP tables -I INPUT -s 99.23.45.1/32 -j DROP

  1. Drop all packets from the source address

  2. Input all packers to the source address

  3. Log all packets to or from the specified address

  4. Drop all packets to the specified address

Answer: A

100% Free Download!
Download Free Demo:GSEC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSEC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE