giac gsec practice test

GIAC Security Essentials

Last exam update: Nov 18 ,2025
Page 1 out of 26. Viewing questions 1-15 out of 385

Question 1

Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?

  • A. B, C, and D
  • B. A, C, and E
  • C. B, D, and E
  • D. A, B, and C
  • E. Inexpensive to manage
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Which of the following protocols is used by a host that knows its own MAC (Media Access Control)
address to query a server for its own IP address?

  • A. RARP
  • B. ARP
  • C. DNS
  • D. RDNS
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What is the motivation behind SYN/FIN scanning?

  • A. The SYN/FIN combination is useful for signaling to certain Trojans.
  • B. SYN/FIN packets are commonly used to launch denial of service attacks against BSD hosts.
  • C. The crafted SYN/FIN packet sometimes gets past firewalls and filtering routers.
  • D. A SYN/FIN packet is used in session hijacking to take over a session.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

There is not universal agreement on the names of the layers in the TCP/IP networking model. Which
of the following is one of the functions of the bottom layer which is sometimes called the Network
Access or Link Layer?

  • A. Provides end-to-end data delivery service for user applications
  • B. Handles the routing of the data packets over the network
  • C. Manages IP addressing and encryption for data packets
  • D. Defines the procedures for interfacing with Ethernet devices
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP
scope on a private LAN?

  • A. 127.0.0.100
  • B. 169.254.1.50
  • C. 10.254.1.50
  • D. 172.35.1.100
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-
step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm.
What is one of the hash algorithms used by PGP for this process?

  • A. Blowfish
  • B. DES
  • C. SHA-l
  • D. Cast
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

You are the security director for an off-shore banking site. From a business perspective, what is a
major factor to consider before running your new vulnerability scanner against the company's
business systems?

  • A. It may harm otherwise healthy systems.
  • B. It may produce false negative results.
  • C. It may generate false positive results.
  • D. It may not return enough benefit for the cost.
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following is a benefit to utilizing Cygwin for Windows?

  • A. The ability to install a complete Red Hat operating system Install on Windows.
  • B. The ability to bring much more powerful scripting capabilities to Windows.
  • C. The ability to run a production Apache server.
  • D. The ability to install a complete Ubuntu operating system install on Windows.
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

What technical control provides the most critical layer of defense if an intruder is able to bypass all
physical security controls and obtain tapes containing critical data?

  • A. Camera Recordings
  • B. Security guards
  • C. Encryption
  • D. Shredding
  • E. Corrective Controls
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Two clients connecting from the same public IP address (for example - behind the same NAT firewall)
can connect simultaneously to the same web server on the Internet, provided what condition is
TRUE?

  • A. The server is not using a well-known port.
  • B. The server is on a different network.
  • C. The client-side source ports are different.
  • D. The clients are on different subnets.
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following is a standard Unix command that would most likely be used to copy raw file
system data for later forensic analysis?

  • A. dd
  • B. backup
  • C. cp
  • D. gzip
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following is NOT a recommended best practice for securing Terminal Services and
Remote Desktop?

  • A. Require TLS authentication and data encryption whenever possible.
  • B. Make sure to allow all TCP 3389 traffic through the external firewall.
  • C. Group Policy should be used to lock down the virtual desktops of thin-client users.
  • D. Consider using IPSec or a VPN in addition to the RDP encryption if you are concerned about future RDP vulnerabilities.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

When an IIS filename extension is mapped, what does this mean?

  • A. Files with the mapped extensions cannot be interpreted by the web server.
  • B. The file and all the data from the browser's request are handed off to the mapped interpreter.
  • C. The files with the mapped extensions are interpreted by CMD.EXE.
  • D. The files with the mapped extensions are interpreted by the web browser.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which Linux file lists every process that starts at boot time?

  • A. inetd
  • B. netsrv
  • C. initd
  • D. inittab
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

When trace route fails to get a timely response for a packet after three tries, which action will it take?

  • A. It will print '* * *' for the attempts and increase the maximum hop count by one.
  • B. It will exit gracefully, and indicate to the user that the destination is unreachable.
  • C. It will increase the timeout for the hop and resend the packets.
  • D. It will print '* * *' for the attempts, increment the TTL and try again until the maximum hop count.
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2