[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GSEC Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GSEC
100% Free Download! 100% Pass Guaranteed!

GIAC Security Essentials

Question No: 91

Which of the following books deals with confidentiality?

  1. Purple Book

  2. Orange Book

  3. Red Book

  4. Brown Book

Answer: B

Question No: 92

If you do NOT have an original file to compare to, what is a good way to identify steganography in potential carrier files?

  1. Determine normal properties through methods like statistics and look for changes

  2. Determine normal network traffic patterns and look for changes

  3. Find files with the extension .stg

  4. Visually verify the files you suspect to be steganography messages

Answer: A

Question No: 93

The process of enumerating all hosts on a network defines which of the following activities?

  1. Port scanning

  2. Vulnerability scanning

  3. GPS mapping

  4. Network mapping

Answer: D

Question No: 94

Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?



  3. PING


Answer: B

Question No: 95

Which of the following protocols work at the Session layer of the OSI model? Each correct answer represents a complete solution. Choose all that apply.

  1. Border Gateway Multicast Protocol (BGMP)

  2. Internet Security Association and Key Management Protocol (ISAKMP)

  3. Trivial File Transfer Protocol (TFTP)

  4. User Datagram Protocol (UDP)

Answer: A,B

Question No: 96

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network. You have configured a firewall on the network. A filter has been applied to

block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

  1. 80

  2. 25

  3. 20

D. 110

Answer: B,D

Question No: 97

The Return on Investment (ROI) measurement used in Information Technology and Information Security fields is typically calculated with which formula?

  1. ROI = (gain – expenditure)/(expenditure) X 100%

  2. ROI = (gain expenditure)/(expenditure) X 100%

  3. ROI = (loss expenditure)/(expenditure) X 100%

  4. ROI = (loss – expenditure)/(expenditure) X 100%

Answer: A

Question No: 98

Which of the following terms refers to the process in which headers and trailers are added around user data?

  1. Encapsulation

  2. Authentication

  3. Authorization

  4. Encryption

Answer: A

Question No: 99

What protocol is a WAN technology?

A. 802.11

B. 802.3

  1. Ethernet

  2. Frame Relay

Answer: D

Question No: 100

Which of the below choices should an organization start with when implementing an effective risk management process?

  1. Implement an incident response plan

  2. Define security policy requirements

  3. Conduct periodic reviews

  4. Design controls and develop standards for each technology you plan to deploy

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GSEC Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GSEC Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.