[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GSEC Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Essentials

Question No: 11

Which of the following is NOT a recommended best practice for securing Terminal Services and Remote Desktop?

  1. Require TLS authentication and data encryption whenever possible.

  2. Make sure to allow all TCP 3389 traffic through the external firewall.

  3. Group Policy should be used to lock down the virtual desktops of thin-client users.

  4. Consider using IPSec or a VPN in addition to the RDP encryption if you are concerned about future RDP vulnerabilities.

Answer: B

Question No: 12

Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

  1. Anonymous authentication

  2. Mutual authentication

  3. Open system authentication

  4. Shared key authentication

Answer: C,D

Question No: 13

Which of the following statements about Microsoft#39;s VPN client software is FALSE?

  1. The VPN interface can be figured into the route table.

  2. The VPN interface has the same IP address as the interface to the network it#39;s been specified to protect.

  3. The VPN client software is built into the Windows operating system.

  4. The VPN tunnel appears as simply another adapter.

Answer: B

Question No: 14

What type of attack can be performed against a wireless network using the tool Kismet?

  1. IP spoofing

  2. Eavesdropping

  3. Masquerading

  4. Denial of Service

Answer: B

Question No: 15

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).

You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish


  1. Copy the files to a network share on an NTFS volume.

  2. Copy the files to a network share on a FAT32 volume.

  3. Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

  4. Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

Answer: A

Question No: 16

Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

  1. RARP

  2. ARP

  3. DNS

  4. RDNS

Answer: A

Question No: 17

Which of the following commands is used to change file access permissions in Linux?

  1. chgrp

  2. chperm

  3. chmod

  4. chown

Answer: C

Question No: 18

There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is

sometimes called the Network Access or Link Layer?

  1. Provides end-to-end data delivery service for user applications

  2. Handles the routing of the data packets over the network

  3. Manages IP addressing and encryption for data packets

  4. Defines the procedures for interfacing with Ethernet devices

Answer: D

Question No: 19

Which of the following elements is the most important requirement to ensuring the success of a business continuity plan?

  1. Disaster Recover Plans

  2. Anticipating all relevant threats

  3. Executive buy-in

  4. Clearly defining roles and responsibilities

  5. Training

Answer: C

Question No: 20

When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?

  1. TCP Sequence Number

  2. Source address

  3. Destination port

  4. Destination address

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GSEC Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GSEC Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.