Exam Details

  • Exam Code
    :GSEC
  • Exam Name
    :GIAC Security Essentials Certification
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :384 Q&As
  • Last Updated
    :Apr 25, 2024

GIAC GIAC Information Security GSEC Questions & Answers

  • Question 1:

    You work as an Administrator for McRoberts Inc. The company has a Linux-based network. You are logged in as a non-root user on your client computer. You want to delete all files from the /garbage directory. You want that the command you will use should prompt for the root user password. Which of the following commands will you use to accomplish the task?

    A. rm -rf /garbage*

    B. del /garbage/*.*

    C. rm -rf /garbage* /SU

    D. su -c "RM -rf /garbage*"

  • Question 2:

    You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

    A. NETSTAT -s

    B. NBTSTAT -s

    C. NBTSTAT -n

    D. NETSTAT -n

  • Question 3:

    You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

    A. netstat -a | grep FTP

    B. FTP netstat -r

    C. FTP netstat -a

    D. netstat -r | grep FTP

  • Question 4:

    You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?

    A. ls

    B. chroot

    C. route

    D. chdir

  • Question 5:

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to delete his private.txt file from his operating system. He knows that the deleted file can be recovered easily. Hence, he wants to delete the file securely. He wants to hide the shredding, and so he desires to add a final overwrite of the file private.txt with zero. Which of the following commands will John use to accomplish his task?

    A. rmdir -v private.txt

    B. shred -vfu private.txt

    C. shred -vfuz private.txt

    D. rm -vf private.txt

  • Question 6:

    Which of the following are the types of access controls?

    Each correct answer represents a complete solution. Choose three.

    A. Physical

    B. Administrative

    C. Automatic

    D. Technical

  • Question 7:

    You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network?

    A. APIPA

    B. LMHOSTS

    C. DNS

    D. DHCP

    E. WINS

  • Question 8:

    You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are required to search for the error messages in the /var/log/messages log file. Which of the following commands will you use to accomplish this?

    A. ps /var/log/messages

    B. cat /var/log/messages | look error

    C. cat /var/log/messages | grep error

    D. cat /var/log/messages

  • Question 9:

    You work as a Network Administrator for McNeil Inc. You are installing an application. You want to view the log file whenever a new entry is added to the /var/log/messages log file. Which of the following commands will you use to accomplish this?

    A. TAIL -show /var/log/messages

    B. TAIL -f /var/log/messages

    C. TAIL -50 /var/log/messages

    D. TAIL -view /var/log/messages

  • Question 10:

    Which of the following statements about buffer overflow is true?

    A. It manages security credentials and public keys for message encryption.

    B. It is a collection of files used by Microsoft for software updates released between major service pack releases.

    C. It is a condition in which an application receives more data than it is configured to accept.

    D. It is a false warning about a virus.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSEC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.