2013년 12월 18일 수요일

GIAC 자격증 GSEC 시험문제와 답

GIAC인증GSEC시험을 패스하기가 어렵다고 하면 합습가이드를 선택하여 간단히 통과하실 수 잇습니다. 우리ITExamDump에서는 무조건 여러분을 위하여 관연 자료덤프 즉 문제와 답을 만들어낼 것입니다. 우리덤프로GIAC인증GSEC시험준비를 잘하시면 100%GIAC인증GSEC시험을 패스할 수 있습니다. ITExamDump덤프로 여러분은GIAC인증GSEC시험을 패스는 물론 여러분의 귀증한 간도 절약하실 수 있습니다.

GIAC인증GSEC시험은 IT인증시험과목중 가장 인기있는 시험입니다. ITExamDump에서는GIAC인증GSEC시험에 대비한 공부가이드를 발췌하여 IT인사들의 시험공부 고민을 덜어드립니다. ITExamDump에서 발췌한 GIAC인증GSEC덤프는 실제시험의 모든 범위를 커버하고 있고 모든 시험유형이 포함되어 있어 시험준비 공부의 완벽한 선택입니다.

GIAC GSEC인증시험도 어려울 뿐만 아니라 신청 또한 어렵습니다.GIAC GSEC시험은 IT업계에서도 권위가 있고 직위가 있으신 분들이 응시할 수 있는 시험이라고 알고 있습니다. 우리 ITExamDump에서는GIAC GSEC관련 학습가이드를 제동합니다. ITExamDump 는 우리만의IT전문가들이 만들어낸GIAC GSEC관련 최신, 최고의 자료와 학습가이드를 준비하고 있습니다. 여러분의 편리하게GIAC GSEC응시하는데 많은 도움이 될 것입니다.

시험 번호/코드: GSEC
시험 이름: GIAC (GIAC Security Essentials Certification)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 280 문항
업데이트: 2013-12-17

ITExamDump의GIAC인증 GSEC덤프를 공부하시면 한방에 시험을 패스하는건 문제가 아닙니다. ITExamDump의GIAC인증 GSEC덤프는 시험적중율 최고의 인지도를 넓히 알리고 있습니다.저희가 제공한 시험예상문제로 시험에 도전해보지 않으실래요? GIAC인증 GSEC덤프를 선택하시면 성공의 지름길이 눈앞에 다가옵니다.

ITExamDump 에서 출시한GIAC인증GSEC 덤프는GIAC인증GSEC 실제시험의 출제범위와 출제유형을 대비하여 제작된 최신버전 덤프입니다. 시험문제가 바뀌면 제일 빠른 시일내에 덤프를 업데이트 하도록 최선을 다하고 있으며 1년 무료 업데이트서비스를 제공해드립니다. 1년 무료 업데이트서비스를 제공해드리기에 시험시간을 늦추어도 시험성적에 아무런 페를 끼치지 않습니다. ITExamDump에 믿음을 느낄수 있도록 구매사이트마다 무료샘플 다운가능기능을 설치하였습니다.무료샘플을 체험해보시고ITExamDump을 선택해주세요.

GSEC 덤프무료샘플다운로드하기: http://www.itexamdump.com/GSEC.html

NO.1 Which of the following is a security threat if included in the search path of a computer?
A. /usr
B. /sbin
C. .
D. /usr/bin
Answer: C

GIAC시험문제   GSEC dumps   GSEC자격증   GSEC

NO.2 You work as a Network Administrator for Perfect World Inc. You are configuring a network that will
include 1000BaseT network interface cards in servers and client computers. What is the maximum
segment length that a 1000BaseT network supports?
A. 100 meters
B. 480 meters
C. 1000 meters
D. 10 meters
Answer: A

GIAC   GSEC   GSEC덤프   GSEC dump

NO.3 Which of the following directories contains the log files in Linux?
A. /log
B. /root
C. /var/log
D. /etc
Answer: C

GIAC   GSEC자료   GSEC   GSEC시험문제

NO.4 Which of the following records is the first entry in a DNS database file?
A. SOA
B. SRV
C. CNAME
D. MX
Answer: A

GIAC   GSEC인증   GSEC

NO.5 Which of the following statements about service pack are true? Each correct answer represents a
complete solution. Choose two.
A. It is a collection of Fixes and Patches in a single product.
B. It is a medium by which product updates are distributed.
C. It is a term generally related to security problems in a software.
D. It is a term used for securing an operating system.
Answer: A,B

GIAC   GSEC   GSEC   GSEC   GSEC

NO.6 Which of the following is used to implement a procedure to control inbound and outbound traffic on a
network?
A. Cookies
B. Sam Spade
C. NIDS
D. ACL
Answer: D

GIAC   GSEC인증   GSEC

NO.7 What is the maximum cable segment length supported by a 10BaseT network?
A. 100 meters
B. 300 meters
C. 250 meters
D. 500 meters
E. 150 meters
Answer: A

GIAC dumps   GSEC자료   GSEC   GSEC   GSEC   GSEC

NO.8 Which of the following is not an encryption technology?
A. Blowfish
B. KILL
C. 3DES
D. MD5
Answer: B

GIAC   GSEC dump   GSEC자료   GSEC   GSEC인증

NO.9 Which of the following is NOT the feature of SELinux in the Red Hat enterprise Linux?
A. SELinux does not provide Kernel-level security.
B. All process and files have a context.
C. SELinux implements Mandatory Access Control (MAC) security in Red Hat Enterprise Linux.
D. SELinux applies to all users, including root.
Answer: A

GIAC최신덤프   GSEC최신덤프   GSEC pdf   GSEC덤프   GSEC기출문제

NO.10 Which of the following terms describes software technologies that improve portability, manageability
and compatibility of applications by encapsulating them from the underlying operating system on which
they are executed?
A. Application virtualization
B. Encapsulation
C. System hardening
D. Failover
Answer: A

GIAC   GSEC   GSEC최신덤프

NO.11 You want to temporarily change your primary group to another group of which you are a member. In
this process, a new shell will be created, and when you exit the shell, your previous group will be
reinstated. Which of the following commands will you use to accomplish this task?
A. newgrp
B. chgrp
C. chown
D. chmod
Answer: A

GIAC   GSEC dump   GSEC   GSEC

NO.12 You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network. You
have created a script named lf.cgi. You want to provide the following permissions on it:
rwsr-sr-- Which of the following commands will you execute?
A. chmod 2754
B. chmod 6754
C. chmod 7754
D. chmod 4754
Answer: B

GIAC dumps   GSEC   GSEC최신덤프   GSEC

NO.13 Which of the following ports is the default port for IMAP4 protocol?
A. TCP port 443
B. TCP port 143
C. TCP port 25
D. TCP port 80
Answer: B

GIAC pdf   GSEC인증   GSEC기출문제   GSEC덤프   GSEC

NO.14 Rick works as a Network Administrator. He is configuring the systems for maximum security. Before
using the security template, he wants to edit it to change some of the security settings that are not
required for now. Which of the following tools will he choose, to edit the security template?
A. Group Policy MMC snap-in
B. Security Configuration and Analysis MMC snap-in
C. Security Templates MMC snap-in
D. SECEDIT utility
Answer: C

GIAC인증   GSEC   GSEC최신덤프

NO.15 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He executes the following
command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?
A. root, 500
B. root, 0
C. John, 502
D. John, 0
Answer: B

GIAC   GSEC pdf   GSEC pdf

NO.16 You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.
You have configured a VPN server for remote users to connect to the company's network. Which of the
following encryption types will Linux use?
A. MSCHAP
B. RC2
C. 3DES
D. CHAP
Answer: C

GIAC   GSEC최신덤프   GSEC자격증   GSEC

NO.17 You work as a Linux Technician for Tech Perfect Inc. You want to protect your server from intruders
who exploit services that are started with TCP Wrappers. Which of the following files will help you protect
the server?
Each correct answer represents a part of the solution. Choose two.
A. httpd.conf
B. lilo.conf
C. hosts.deny
D. hosts.allow
Answer: C, D

GIAC   GSEC dumps   GSEC시험문제   GSEC최신덤프   GSEC기출문제

NO.18 The /cat/etc/passwd file on a client computer contains the following entry: Martha:x:::::bin/false
Which of the following is true for Martha?
A. Martha's password is x.
B. Martha has full access on the computer.
C. Martha has limited access on the computer.
D. Martha has been denied access on the computer.
Answer: D

GIAC덤프   GSEC   GSEC   GSEC dump

NO.19 Which of the following terms is synonymous with the willful destruction of another person's property?
A. Spoofing
B. Hacking
C. Phishing
D. Vandalism
Answer: D

GIAC시험문제   GSEC   GSEC dump   GSEC   GSEC

NO.20 Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-
based network. The company has two offices in different cities. The offices are connected through the
Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is
required to create a secure connection between both offices. He configures a VPN connection between
the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of
the following will he achieve with this configuration?
Each correct answer represents a part of the solution. Choose two.
A. Encryption for the local files stored on the two servers
B. Highest possible encryption for traffic between the offices
C. Mutual authentication between the two servers
D. Extra bandwidth on the Internet connection
Answer: B, C

GIAC   GSEC   GSEC dumps   GSEC   GSEC시험문제

NO.21 Which of the following statements about the availability concept of Information security management is
true?
A. It ensures reliable and timely access to resources.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
D. It ensures that modifications are not made to data by unauthorized personnel or processes.
Answer: A

GIAC dumps   GSEC자격증   GSEC인증

NO.22 You have been hired by the company to upgrade its existing Windows NT 4.0 network to a Windows
2000 based network. In the past, the company's support group has faced difficult time because users
changed the configuration of their workstations. Which of the following features of the Active Directory
would best justify the move to the Windows 2000 network.?
A. Dynamic domain name system (DDNS)
B. Organizational unit (OU)
C. Dynamic host configuration protocol (DHCP)
D. Group policy object (GPO)
Answer: D

GIAC   GSEC시험문제   GSEC   GSEC덤프   GSEC인증

NO.23 Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct
answer represents a complete solution. Choose all that apply.
A. SSL provides message integrity to prevent alteration to the message.
B. During SSL session, information is encrypted to prevent unauthorized disclosure.
C. SSL can process credit cards.
D. SSL can support 128-bit encryption.
Answer: A,B,D

GIAC dump   GSEC시험문제   GSEC   GSEC   GSEC최신덤프

NO.24 Which of the following terms refers to manual assignment of IP addresses to computers and devices?
A. Static IP addressing
B. Spoofing
C. APIPA
D. Dynamic IP addressing
Answer: A

GIAC   GSEC   GSEC pdf   GSEC dumps   GSEC기출문제

NO.25 Which of the following protocols multicasts messages and information among all member devices in
an IP multicast group?
A. IGMP
B. TCP
C. ARP
D. ICMP
Answer: A

GIAC   GSEC   GSEC

NO.26 You have a customer who wants to put wireless internet in his remote cabin. The cabin is many miles
from any other building with internet connectivity or access points. What should you recommend?
A. DSL
B. FIOS connection
C. Satellite internet
D. Microwave connection
Answer: C

GIAC자료   GSEC   GSEC

NO.27 Which of the following devices connects two segments of the same local area network (LAN) but keeps
traffic separate on the two segments?
A. Hub
B. Modem
C. Bridge
D. Switch
Answer: C

GIAC덤프   GSEC   GSEC자격증   GSEC자료   GSEC

NO.28 Which of the following frequencies are used by wireless standard 802.11n to operate? Each correct
answer represents a complete solution. Choose two.
A. 1 Ghz
B. 2 Ghz
C. 2.4 Ghz
D. 5 Ghz
Answer: C, D

GIAC덤프   GSEC   GSEC덤프   GSEC   GSEC dump   GSEC

NO.29 Which of the following enables an inventor to legally enforce his right to exclude others from using his
invention?
A. Patent
B. Artistic license
C. Phishing
D. Spam
Answer: A

GIAC pdf   GSEC기출문제   GSEC덤프   GSEC시험문제   GSEC자격증   GSEC dumps

NO.30 Which of the following statements are true about satellite broadband Internet access? Each correct
answer represents a complete solution. Choose two.
A. It is among the least expensive way of gaining broadband Internet access.
B. It is among the most expensive way of gaining broadband Internet access.
C. This type of internet access has low latency compared to other broadband services.
D. This type of internet access has high latency compared to other broadband services.
Answer: B, D

GIAC dump   GSEC   GSEC pdf   GSEC dump   GSEC덤프

ITexamdump의 00M-653덤프의 VCE테스트프로그램과 LOT-951덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 000-596시험에 대비한 고품질 덤프와 000-196시험 최신버전덤프를 제공해드립니다. 최고품질 C_TERP10_65시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.

시험자료링크: http://www.itexamdump.com/GSEC.html

댓글 없음:

댓글 쓰기