New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSEC Exam Dumps - GIAC Security Administration Questions and Answers

Question # 104

Which of the following quantifies the effects of a potential disaster over a period of time?

Options:

A.

Risk Assessment

B.

Business Impact Analysis

C.

Disaster Recovery Planning

D.

Lessons Learned

Buy Now
Question # 105

What is the purpose of notifying stakeholders prior to a scheduled vulnerability scan?

Options:

A.

Risk of system crashes and security alerts.

B.

Risk of deletion of backup files.

C.

Risk of modified application configuration files.

D.

Risk of applying untested patches.

Buy Now
Question # 106

You have an automated system for patching the operating systems of all your computers. All patches are supposedly current. Yet your automated vulnerability scanner has just reported vulnerabilities that you believe have been patched. Which of the actions below should you take next?

Options:

A.

Check some systems manually.

B.

Rerun the system patching routines.

C.

Contact the incident response team.

D.

Ignore the findings as false positives.

Buy Now
Question # 107

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

rm private.txt #11 Nov 2009 02:59:58 am

B.

touch -d "11 Nov 2009 02:59:58 am" private.txt

C.

touch private.txt #11 Nov 2009 02:59:58 am

D.

touch -t 200911110259.58 private.txt

Buy Now
Question # 108

An organization keeps its intellectual property in a database. Protection of the data is assigned to one system administrator who marks the data, and monitors for this intellectual property leaving the network. Which defense-In-depth principle does this describe?

Options:

A.

Threat-Vector Analysis

B.

Protected Enclave

C.

Information Centric

D.

Uniform Protection

Buy Now
Question # 109

An attacker is able to trick an IDS into ignoring malicious traffic through obfuscation of the packet payload. What type of IDS error has occurred?

Options:

A.

True Negative

B.

True Positive

C.

False Positive

D.

False Negative

Buy Now
Question # 110

Which Linux file lists every process that starts at boot time?

Options:

A.

inetd

B.

netsrv

C.

initd

D.

inittab

Buy Now
Question # 111

Which of the following statements would describe the term "incident" when used in the branch of security known as Incident Handling?

Options:

A.

Any observable network event

B.

Harm to systems

C.

Significant threat of harm to systems

D.

A and C

E.

A, B, and C

F.

B and C

G.

A and B

Buy Now
Question # 112

Which type of risk assessment results are typically categorized as low, medium, or high-risk events?

Options:

A.

Technical

B.

Qualitative

C.

Management

D.

Quantitative

Buy Now
Question # 113

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

Options:

A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Last Update: Jan 8, 2026
Questions: 385
GSEC pdf

GSEC PDF

$25.5  $84.99
GSEC Engine

GSEC Testing Engine

$28.5  $94.99
GSEC PDF + Engine

GSEC PDF + Testing Engine

$40.5  $134.99