[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GSEC Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Essentials

Question No: 51

Which common firewall feature can be utilized to generate a forensic trail of evidence and to identify attack trends against your network?

  1. NAT

  2. State Table

  3. Logging

  4. Content filtering

Answer: C

Question No: 52

With regard to defense-in-depth, which of the following statements about network design principles is correct?

  1. A secure network design requires that systems that have access to the Internet should not be accessible from the Internet and that systems accessible from the Internet should not have access to the Internet.

  2. A secure network design requires that networks utilize VLAN (Virtual LAN) implementations to insure that private and semi-public systems are unable to reach each other without going through a firewall.

  3. A secure network design will seek to provide an effective administrative structure by providing a single choke-point for the network from which all security controls and restrictions will be enforced.

  4. A secure network design will seek to separate resources by providing a security boundary between systems that have different network security requirements.

Answer: D

Question No: 53

What is the main reason that DES is faster than RSA?

  1. DES is less secure.

  2. DES is implemented in hardware and RSA is implemented in software.

  3. Asymmetric cryptography is generally much faster than symmetric.

  4. Symmetric cryptography is generally much faster than asymmetric.

Answer: D

Question No: 54

Your system has been infected by malware. Upon investigation, you discover that the

malware propagated primarily via email. The malware attacked known vulnerabilities for which patches are available, but due to problems with your configuration management system you have no way to know which systems have been patched and which haven#39;t, slowing your progress in patching your network. Of the following, which solution would you use to protect against this propagation vector?

  1. Encrypt the emails on the server

  2. Scan and block suspect email attachments at the email server

  3. Install a firewall between the email server and the Internet

  4. Separate the email server from the trusted portions of the network

Answer: B

Question No: 55

Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

  1. Application

  2. System

  3. Startup

  4. Security

Answer: B

Question No: 56

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

  1. IMAP

  2. SNMP

  3. POP3

  4. SMTP

Answer: A

Question No: 57

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

  1. Physical

  2. Administrative

  3. Automatic

  4. Technical

Answer: A,B,D

Question No: 58

What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?

  1. These fields are decremented each time a packet is retransmitted to minimize the possibility of routing loops.

  2. These fields are initialized to an initial value to prevent packet fragmentation and fragmentation attacks.

  3. These fields are recalculated based on the required time for a packet to arrive at its destination.

  4. These fields are incremented each time a packet is transmitted to indicate the number of routers that an IP packet has traversed.

Answer: A

Question No: 59

Where could you go in Windows XP/2003 to configure Automatic Updates?

  1. Right click on the Start Menu and choose select Properties in the pop-up Menu.

  2. Open the MMC and choose the Automatic Updates snap-in.

  3. Right click on your desktop and choose the automatic updates.

  4. Go to the System applet in Control Panel and click on the Automatic Updates icon.

Answer: D

Question No: 60

Which of the following statements about Secure Sockets Layer (SSL) are true? Each correct answer represents a complete solution. Choose two.

  1. It provides communication privacy, authentication, and message integrity.

  2. It provides mail transfer service.

  3. It uses a combination of public key and symmetric encryption for security of data.

  4. It provides connectivity between Web browser and Web server.

Answer: A,C

100% Ensurepass Free Download!
Download Free Demo:GSEC Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GSEC Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.