New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free GSEC GIAC Updates

Page: 10 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 37

The following three steps belong to the chain of custody for federal rules of evidence. What additional step is recommended between steps 2 and 3?

STEP 1 - Take notes: who, what, where, when and record serial numbers of machine(s) in question.

STEP 2 - Do a binary backup if data is being collected.

STEP 3 - Deliver collected evidence to law enforcement officials.

Options:

A.

Rebuild the original hard drive from scratch, and sign and seal the good backup in a plastic bag.

B.

Conduct a forensic analysis of all evidence collected BEFORE starting the chain of custody.

C.

Take photographs of all persons who have had access to the computer.

D.

Check the backup integrity using a checksum utility like MD5, and sign and seal each piece of collected evidence in a plastic bag.

Question 38

How often is session information sent to the web server from the browser once the session information has been established?

Options:

A.

With any change in session data

B.

With every subsequent request

C.

With any hidden form element data

D.

With the initial request to register the session

Question 39

You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?

Options:

A.

WPA

B.

TKIP

C.

WEP

D.

WPA 2

Question 40

Which of the following is a backup strategy?

Options:

A.

Differential

B.

Integrational

C.

Recursive

D.

Supplemental

Page: 10 / 29
Total 385 questions