Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSEC Exam Dumps - GIAC Security Administration Questions and Answers

Question # 24

You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:

* they contain only numerals

* they contain only letters

* they contain only special characters

* they contain only letters and numerals

" they contain only letters and special characters

* they contain only numerals and special characters

Of the following, what is the benefit to using this set of tests?

Options:

A.

They are focused on cracking passwords that use characters prohibited by the password policy

B.

They find non-compliant passwords without cracking compliant passwords.

C.

They are focused on cracking passwords that meet minimum complexity requirements

D.

They crack compliant and non-compliant passwords to determine whether the current policy is strong enough

Buy Now
Question # 25

Which Linux command could a systems administrator use to determine if an attacker had opened up a new listening port on her system?

Options:

A.

nfsstat

B.

netreport

C.

ps

D.

netstat

E.

vrnstat

Buy Now
Question # 26

Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

Options:

A.

NBTSTAT

B.

NSLOOKUP

C.

PING

D.

NETSTAT

Buy Now
Question # 27

How can an adversary utilize a stolen database of unsalted password hashes?

Options:

A.

Decrypt them to find the dear text passwords

B.

Compare the hashed output of guessed passwords with them

C.

Authenticate with the service associated with the on-line database

D.

Reverse engineer them to find the encryption key

Buy Now
Question # 28

Which of the following protocols implements VPN using IPSec?

Options:

A.

SLIP

B.

PPP

C.

L2TP

D.

PPTP

Buy Now
Question # 29

A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?

Options:

A.

Power

B.

Smoke

C.

Natural Gas

D.

Water

E.

Toxins

Buy Now
Question # 30

Which of the following logging tasks should be evaluated in real-time?

Options:

A.

Inside and perimeter log trends review

B.

Routine account creation/removal

C.

Log management system performance

D.

Loss of service on critical assets

Buy Now
Question # 31

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses TCP port 443 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It is a protocol used to provide security for a database server in an internal network.

D.

It uses TCP port 80 as the default port.

Buy Now
Question # 32

Which of the following protocols provides maintenance and error reporting function?

Options:

A.

UDP

B.

ICMP

C.

PPP

D.

IGMP

Buy Now
Question # 33

What is the term for the software that allows a single physical server to run multiple virtual servers?

Options:

A.

Virtual machine

B.

Hypervisor

C.

Host

D.

Guest

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Last Update: Aug 24, 2025
Questions: 385
GSEC pdf

GSEC PDF

$25.5  $84.99
GSEC Engine

GSEC Testing Engine

$28.5  $94.99
GSEC PDF + Engine

GSEC PDF + Testing Engine

$40.5  $134.99