Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSEC Exam Dumps - GIAC Security Administration Questions and Answers

Question # 4

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring an application server. An application named Report, which is owned by the root user, is placed on the server. This application requires superuser permission to write to other files. All sales managers of the company will be using the application. Which of the following steps will you take in order to enable the sales managers to run and use the Report application?

Options:

A.

Change the Report application to a SUID command.

B.

Make the user accounts of all the sales managers the members of the root group.

C.

Provide password of root user to all the sales managers.

Ask each sales manager to run the application as the root user.

D.

As the application is owned by the root, no changes are required.

Buy Now
Question # 5

Which of the below choices should an organization start with when implementing an effective risk management process?

Options:

A.

Implement an incident response plan

B.

Define security policy requirements

C.

Conduct periodic reviews

D.

Design controls and develop standards for each technology you plan to deploy

Buy Now
Question # 6

What is the most secure way to address an unused Windows service so it cannot be exploited by malware?

Options:

A.

Firewall it

B.

Set to manual startup

C.

Disable it

D.

Uninstall it

Buy Now
Question # 7

How many bytes does it take to represent the hexadecimal value OxFEDCBA?

Options:

A.

12

B.

2

C.

3

D.

6

Buy Now
Question # 8

When should you create the initial database for a Linux file integrity checker?

Options:

A.

Before a system is patched

B.

After a system has been compromised

C.

Before a system has been compromised

D.

During an attack

Buy Now
Question # 9

Options:

A.

JSON

B.

XML

C.

CEF

D.

LEEF

Buy Now
Question # 10

Which of the following is a Personal Area Network enabled device?

Options:

A.

Corporate access point extender

B.

Bluetooth mouse

C.

Home Win router

D.

Network enabled printer

Buy Now
Question # 11

Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?

Options:

A.

Application

B.

System

C.

Startup

D.

Security

Buy Now
Question # 12

A simple cryptosystem that keeps the same letters and shuffles the order is an example of what?

Options:

A.

Permutation

B.

Rotation

C.

Monolithic

D.

Substitution

Buy Now
Question # 13

What does it mean if a protocol such as HTTP is stateless?

Options:

A.

The client responds to server request and keeps track of the conversation.

B.

If a stateless protocol is used it cannot be traced.

C.

It means it is unreliable.

D.

The server responds to a single request and then forgets about it.

Buy Now
Exam Code: GSEC
Exam Name: GIAC Security Essentials
Last Update: Aug 24, 2025
Questions: 385
GSEC pdf

GSEC PDF

$25.5  $84.99
GSEC Engine

GSEC Testing Engine

$28.5  $94.99
GSEC PDF + Engine

GSEC PDF + Testing Engine

$40.5  $134.99