You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open? Each correct answer represents a complete solution. Choose two.
A. 80
B. 25
C. 20
D. 110
Fill in the blank with the correct answer to complete the statement below.
The permission is the minimum required permission that is necessary for a user to enter a directory and
list its contents.
A. Read
Which of the following is a name, symbol, or slogan with which a product is identified?
A. Copyright
B. Trademark
C. Trade secret
D. Patent
Which of the following is a signature-based intrusion detection system (IDS) ?
A. RealSecure
B. Snort
C. StealthWatch
D. Tripwire
You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network
environment. The network is configured as a Windows Active Directory-based single forest domain-based
network. The company's management has decided to provide laptops to its sales team members. These
laptops are equipped with smart card readers. The laptops will be configured as wireless network clients.
You are required to accomplish the following tasks:
The wireless network communication should be secured.
The laptop users should be able to use smart cards for getting authenticated.
In order to accomplish the tasks, you take the following steps:
Configure 802.1x and WEP for the wireless connections.
Configure the PEAP-MS-CHAP v2 protocol for authentication.
What will happen after you have taken these steps?
A. The laptop users will be able to use smart cards for getting authenticated.
B. Both tasks will be accomplished.
C. None of the tasks will be accomplished.
D. The wireless network communication will be secured.
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task? Each correct answer represents a complete solution. Choose two.
A. smbmount
B. mount smb
C. smbfsmount
D. mount -t smbfs
Which of the following processes is known as sanitization?
A. Assessing the risk involved in discarding particular information.
B. Verifying the identity of a person, network host, or system process.
C. Physically destroying the media and the information stored on it.
D. Removing the content from the media so that it is difficult to restore.
Which of the following defines the communication link between a Web server and Web applications?
A. CGI
B. PGP
C. Firewall
D. IETF
What does the "x" character in the second field of the user account record of the /etc/passwd file indicate?
A. The user account is using a shadow password.
B. The user account is shared by more than one user.
C. The user account is disabled.
D. The user account does not exist.
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
A. Privacy policy
B. Backup policy
C. User password policy
D. Network security policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSEC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.