New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your GSEC Security Administration Exam

Page: 20 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 77

What could be used to mitigate hash collisions?

Options:

A.

Using a larger key space for the encryption

B.

Using additional arbitrary data to append to the file

C.

Using separate keys for encryption and decryption

D.

Using a larger bit length for the algorithm

Question 78

Which of the following statements about the authentication concept of information security management is true?

Options:

A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

Question 79

How can an adversary utilize a stolen database of unsalted password hashes?

Options:

A.

Decrypt them to find the dear text passwords

B.

Compare the hashed output of guessed passwords with them

C.

Authenticate with the service associated with the on-line database

D.

Reverse engineer them to find the encryption key

Question 80

Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.

This style of defense-in-depth protection is best described as which of the following?

Options:

A.

Uniform protection

B.

Threat-oriented

C.

Information-centric

D.

Protected enclaves

Page: 20 / 29
Total 385 questions