[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSEC Dumps with VCE and PDF 81-90

CollectDumps 2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSEC.html

GIAC Security Essentials

Question No: 81

What is the main problem with relying solely on firewalls to protect your company#39;s sensitive data?

  1. Their value is limited unless a full-featured Intrusion Detection System is used.

  2. Their value is limited because they cannot be changed once they are configured.

  3. Their value is limited because operating systems are now automatically patched.

  4. Their value is limited because they can be bypassed by technical and non-technical means.

Answer: D

Question No: 82

Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.

This style of defense-in-depth protection is best described as which of the following?

  1. Uniform protection

  2. Protected enclaves

  3. Vector-oriented

  4. Information-centric

Answer: B

Question No: 83

What is the maximum number of connections a normal Bluetooth device can handle at one time?

  1. 2

  2. 4

  3. 1

  4. 8

  5. 7

Answer: E

Question No: 84

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory- based single forest domain-based network. The company#39;s management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

  1. The laptop users will be able to use smart cards for getting authenticated.

  2. Both tasks will be accomplished.

  3. None of the tasks will be accomplished.

  4. The wireless network communication will be secured.

Answer: D

Question No: 85

Your CIO has found out that it is possible for an attacker to clone your company#39;s RFID (Radio Frequency ID) based key cards. The CIO has tasked you with finding a way to ensure that anyone entering the building is an employee. Which of the following authentication types would be the appropriate solution to this problem?

  1. Mandatory Access Controls

  2. Bell-LaPadula

  3. Two-Factor

  4. TACACS

Answer: C

Question No: 86

Where is the source address located in an IPv4 header?

  1. At an offset of 20 bytes

  2. At an offset of 8 bytes

  3. At an offset of 16 bytes

  4. At an offset of 12 bytes

Answer: D

Question No: 87

You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

  1. A firewall is blocking him.

  2. His laptop is incompatible.

  3. MAC filtering is blocking him.

  4. His operating system is incompatible.

Answer: C

Question No: 88

In trace route results, what is the significance of an * result?

  1. A listening port was identified.

  2. A reply was returned in less than a second.

  3. The target host was successfully reached.

  4. No reply was received for a particular hop.

Answer: D

Question No: 89

Which of the following statements best describes where a border router is normally placed?

  1. Between your firewall and your internal network

  2. Between your firewall and DNS server

  3. Between your ISP and DNS server

  4. Between your ISP and your external firewall

Answer: D

Question No: 90

You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network?

  1. APIPA

  2. LMHOSTS

  3. DNS

  4. DHCP

  5. WINS

Answer: C

100% Free Download!
Download Free Demo:GSEC Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSEC Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE