Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSEC Exam Dumps - GIAC Security Administration Questions and Answers

Question # 54

In a /24 subnet, which of the following is a valid broadcast address?

Options:

A.

200.11.11.1

B.

221.10.10.10

C.

245.20.30.254

D.

192.10.10.255

Buy Now
Question # 55

When a packet leaving the network undergoes Network Address Translation (NAT), which of the following is changed?

Options:

A.

TCP Sequence Number

B.

Source address

C.

Destination port

D.

Destination address

Buy Now
Question # 56

Which of the following statements about Secure Sockets Layer (SSL) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It provides communication privacy, authentication, and message integrity.

B.

It provides mail transfer service.

C.

It uses a combination of public key and symmetric encryption for security of data.

D.

It provides connectivity between Web browser and Web server.

Buy Now
Question # 57

What cryptographic technique does file Integrity monitoring employ?

Options:

A.

Public-key cryptography

B.

One-way hashes

C.

Elliptical curve algorithms

D.

Shared key cryptography

Buy Now
Question # 58

A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it's in use. What feature of HIPS is being described in this scenario?

Options:

A.

Signature Matching

B.

Application Behavior Monitoring

C.

Host Based Sniffing

D.

Application Action Modeling

Buy Now
Question # 59

What is TRUE about Workgroups and Domain Controllers?

Options:

A.

By default all computers running Windows 2008 can only form Domain Controllers not Workgroups

B.

Workgroups are characterized by higher costs while Domain Controllers by lower costs

C.

You cannot have stand-alone computers in the midst of other machines that are members of a domain

D.

Workgroup computers cannot share resources, only computers running on the same domain can

E.

You can have stand-alone computers in the midst of other machines that are members of a domain.

Buy Now
Question # 60

Which of the following statements best describes where a border router is normally placed?

Options:

A.

Between your firewall and your internal network

B.

Between your firewall and DNS server

C.

Between your ISP and DNS server

D.

Between your ISP and your external firewall

Buy Now
Question # 61

What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

Options:

A.

SCHTASKS.EXE

B.

SCHEDULETSKS.EXE

C.

SCHEDULR.EXE

D.

SCHRUN.EXE

Buy Now
Question # 62

What does an attacker need to consider when attempting an IP spoofing attack that relies on guessing Initial Sequence Numbers (ISNs)?

Options:

A.

These attacks work against relatively idle servers.

B.

These attacks rely on a modified TCP/IP stack to function.

C.

These attacks can be easily traced back to the source.

D.

These attacks only work against Linux/Unix hosts.

Buy Now
Question # 63

What Amazon Web Services (AWS) term describes a grouping of at least one datacenter with redundant power, high speed connections to other data centres and the Internet?

Options:

A.

Management subnet

B.

Availability zone

C.

Region

D.

virtual private cloud

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Last Update: Aug 24, 2025
Questions: 385
GSEC pdf

GSEC PDF

$25.5  $84.99
GSEC Engine

GSEC Testing Engine

$28.5  $94.99
GSEC PDF + Engine

GSEC PDF + Testing Engine

$40.5  $134.99