Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Last Attempt GSEC Questions

Page: 9 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 33

What is log, pre-processing?

Options:

A.

Removing known bad log event entries

B.

Converting logs from one format to another

C.

Moving log entries of unknown status to an analyst's queue

D.

Transferring logs to short-term storage

Question 34

What does PowerShell remoting use to authenticate to another host in a domain environment?

Options:

A.

Two factor codes

B.

Unique application passwords

C.

PreShared keys

D.

Kerberos tickets

Question 35

Which of the following is an advantage of an Intrusion Detection System?

Options:

A.

It is a mature technology.

B.

It is the best network security.

C.

It never needs patching.

D.

It is a firewall replacement.

Question 36

An email system administrator deploys a configuration blocking all inbound and outbound executable files due to security concerns.

What Defense in Depth approach is being used?

Options:

A.

Protected Enclaves

B.

Uniform Protection

C.

Vector Oriented

D.

Information Centric

Page: 9 / 29
Total 385 questions