New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GSEC Leak Questions

Page: 4 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 13

You have reason to believe someone with a domain user account has been accessing and modifying sensitive spreadsheets on one of your application servers. You decide to enable auditing for the files to see who is accessing and changing them. You enable the Audit Object Access policy on the files via Group Policy. Two weeks later, when you check on the audit logs, you see they are empty. What is the most likely reason this has happened?

Options:

A.

You cannot enable auditing on files, just folders

B.

You did not enable auditing on the files

C.

The person modifying the files turned off auditing

D.

You did not save the change to the policy

Question 14

Which of the following would be a valid reason to use a Windows workgroup?

Options:

A.

Lower initial cost

B.

Simplicity of single sign-on

C.

Centralized control

D.

Consistent permissions and rights

Question 15

Which of the following heights of fence deters only casual trespassers?

Options:

A.

8 feet

B.

2 to 2.5 feet

C.

6 to 7 feet

D.

3 to 4 feet

Question 16

Analyze the screenshot below. What is the purpose of this message?

Options:

A.

To gather non-specific vulnerability information

B.

To get the user to download malicious software

C.

To test the browser plugins for compatibility

D.

To alert the user to infected software on the computer.

Page: 4 / 29
Total 385 questions