Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access GIAC GSEC New Release

Page: 21 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 81

What defensive measure could have been taken that would have protected the confidentiality of files that were divulged by systems that were compromised by malware?

Options:

A.

Ingress filtering at the host level

B.

Monitoring for abnormal traffic flow

C.

Installing file integrity monitoring software

D.

Encrypting the files locally when not in use

Question 82

A system administrator sees the following URL in the webserver logs:

Which action will mitigate against this attack?

Options:

A.

Force all web applications to use SSL/US

B.

Encode web traffic using Base64 before transmission

C.

Filter potentially harmful characters from user input

D.

Authenticate users before allowing database queries

Question 83

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses TCP port 443 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It is a protocol used to provide security for a database server in an internal network.

D.

It uses TCP port 80 as the default port.

Question 84

Which of the following resources is a knowledge base of real-world observed adversary tactics and techniques?

Options:

A.

Lockheed Martin Cyber Kill Chain

B.

MITRE ATT&CK

C.

CIS Controls

D.

NIST Framework

Page: 21 / 29
Total 385 questions