New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration GSEC Passing Score

Page: 2 / 29
Total 385 questions

GIAC Security Essentials Questions and Answers

Question 5

What is the main problem with relying solely on firewalls to protect your company's sensitive data?

Options:

A.

Their value is limited unless a full-featured Intrusion Detection System is used.

B.

Their value is limited because they cannot be changed once they are configured.

C.

Their value is limited because operating systems are now automatically patched.

D.

Their value is limited because they can be bypassed by technical and non-technical means.

Question 6

What is a recommended defense against SQL injection, OS injection, and buffer overflows?

Options:

A.

Put in an application layer

B.

Validate user input

C.

Use a secure protocol like HTTPS

D.

Use stored procedures

Question 7

Which of the following is a potential WPA3 security issue?

Options:

A.

Backward compatibility

B.

Disassociate frame DoS

C.

Traffic decryption with PSK

D.

Short key lengths

Question 8

Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?

Options:

A.

Information centric defense

B.

Uniform information protection

C.

General information protection

D.

Perimeter layering

Page: 2 / 29
Total 385 questions