GSEC Free Sample Questions

GIAC Security Essentials Practice Test
10/515 questions ยท Unlock full access
Q1

Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?

Q2

Which of the following protocols is used by a host that knows its own MAC (Media Access Control) address to query a server for its own IP address?

Q3

What is the motivation behind SYN/FIN scanning?

Q4

There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?

Q5

Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP scope on a private LAN?

Q6

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

Q7

You are the security director for an off-shore banking site. From a business perspective, what is a major factor to consider before running your new vulnerability scanner against the company's business systems?

Q8

Which of the following is a benefit to utilizing Cygwin for Windows?

Q9

What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

Q10

Two clients connecting from the same public IP address (for example - behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?