Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration GSEC Book

Page: 15 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 57

Included below is the output from a resource kit utility run against local host.

Which command could have produced this output?

Options:

A.

Schtasks

B.

Task kill

C.

SC

D.

Task list

Question 58

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Host-based intrusion detection system (HIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Server-based intrusion detection system (SIDS)

D.

Network intrusion detection system (NIDS)

Question 59

A Network Engineer is charged with maintaining and protecting a network with a high availability requirement. In addition to other defenses, they have chosen to implement a NIPS. How should the NIPS failure conditions be configured to ensure availability if the NIPS is installed in front of the Firewall that protects the DMZ?

Options:

A.

Fail safe

B.

Fail smart

C.

Fail-closed

D.

Fail-open

Question 60

What type of HTTP session tracking artifact is designed to expire once a user’s web browser session is closed?

Options:

A.

URL Session ID

B.

Client Side Certificate

C.

Hidden Form Field

D.

Non-Persistent Cookie

Page: 15 / 29
Total 385 questions