Exam Details

  • Exam Code
    :GSEC
  • Exam Name
    :GIAC Security Essentials Certification
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :384 Q&As
  • Last Updated
    :May 12, 2024

GIAC GIAC Information Security GSEC Questions & Answers

  • Question 41:

    Which of the following applications cannot proactively detect anomalies related to a computer?

    A. Firewall installed on the computer

    B. NIDS

    C. HIDS

    D. Anti-virus scanner

  • Question 42:

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

    A. usermod -s

    B. chage

    C. usermod -u

    D. useradd -s

  • Question 43:

    On which of the following OSI model layers does IPSec operate?

    A. Physical layer

    B. Network layer

    C. Data-link layer

    D. Session layer

  • Question 44:

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

    A. nice -n 19 cc -c *.c and

    B. nice cc -c *.c and

    C. nice -n -20 cc -c *.c and

    D. nice cc -c *.c

  • Question 45:

    You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?

    A. killall httpd

    B. endall httpd

    C. kill httpd

    D. end httpd

  • Question 46:

    Which port category does the port 110 fall into?

    A. Well known port

    B. Dynamic port

    C. Private port

    D. Application port

  • Question 47:

    Which of the following describes software technologies that improve portability, manageability, and compatibility of applications by encapsulating them from the underlying operating system on which they are executed?

    A. System registry

    B. Group Policy

    C. Application virtualization

    D. System control

  • Question 48:

    You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You have created a folder named Report. You have made David the owner of the folder. The members of a group named JAdmin can access the folder and have Read, Write, and Execute permissions. No other user can access the folder. You want to ensure that the members of the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder. Which of the following commands will you use to accomplish the task?

    A. chmod 777 report

    B. chown david.jadmin report

    C. chmod 555 report

    D. chmod 754 report

  • Question 49:

    You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

    A. Take a full backup daily with the previous night's tape taken offsite.

    B. Take a full backup daily and use six-tape rotation.

    C. Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

    D. Take a full backup on alternate days and keep rotating the tapes.

    E. Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

    F. Take a full backup daily with one tape taken offsite weekly.

  • Question 50:

    Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

    A. NBTSTAT

    B. NSLOOKUP

    C. PING

    D. NETSTAT

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSEC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.