Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSEC GIAC Security Essentials Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSEC GIAC Security Essentials certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 6
Total 385 questions

An attacker gained physical access to an internal computer to access company proprietary data. The facility is protected by a fingerprint biometric system that records both failed and successful entry attempts. No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?

A.

Try raising the Crossover Error Rate (CER)

B.

Try to lower the False Accept Rate (FAR)

C.

Try setting the Equal Error Rate (EER) to zero

D.

Try to set a lower False Reject Rate (FRR)

Which of the following TCP packet flags indicates that host should IMMEDIATELY terminate the connection containing the packet?

A.

FIN

B.

URG

C.

SYN

D.

RST

Which of the following is used to allow or deny access to network resources?

A.

Spoofing

B.

ACL

C.

System hardening

D.

NFS

What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?

A.

Template application should be done remotely

B.

Templates must be received from a domain controller

C.

Template application requires domain administrator rights

D.

Template application cannot be automatically reversed

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?

Each correct answer represents a complete solution. Choose all that apply.

A.

They allow an attacker to conduct a buffer overflow.

B.

They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.

C.

They allow an attacker to replace utility programs that can be used to detect the attacker's activity.

D.

They allow an attacker to run packet sniffers secretly to capture passwords.

Which of the following protocols is used to send e-mails on the Internet?

A.

SMTP

B.

IMAP4

C.

POP3

D.

HTTP

Which of the following items are examples of preventive physical controls? Each correct answer represents a complete solution. Choose three.

A.

Biometric access controls

B.

Closed-circuit television monitors

C.

Fire extinguishers

D.

Locks and keys

Where could you go in Windows XP/2003 to configure Automatic Updates?

A.

Right click on the Start Menu and choose select Properties in the pop-up Menu.

B.

Open the MMC and choose the Automatic Updates snap-in.

C.

Right click on your desktop and choose the automatic updates.

D.

Go to the System applet in Control Panel and click on the Automatic Updates icon.

Your software developer comes to you with an application that controls a user device. The application monitors its own behavior and that of the device and creates log files. The log files are expected to grow steadily and rapidly. Your developer currently has the log files stored in the /bin folder with the application binary. Where would you suggest that the developer store the log files?

A.

/var/log

B.

/etc/log

C.

/usr/log

D.

/tmp/log

E.

/dev/log

Which of the following SIP INVITE lines indicates to the remote registrar the VoIP phone that initiated the call?

A.

Via

B.

To

C.

From-Agent

D.

User-Agent

Which of the following is referred to as Electromagnetic Interference (EMI)?

A.

Electrical line noise

B.

Spike

C.

Transient

D.

Brownout

Which of the following TCP dump output lines indicates the first step in the TCP 3-way handshake?

A.

07:09:43.368615 download.net 39904 > ftp.com.21: S

733381829:733381829(0) win 8760 (DF)

B.

07:09:43.370302 ftp.com.21 > download.net.39904: S

1192930639:1192930639(0} ack 733381830 win 1024

1460> (DF)

C.

09:09:22.346383 ftp.com.21 > download.net.39904: , rst 1 win

2440(DF)

D.

07:09:43.370355 download.net.39904 > ftp.com.21: , ack 1 win

8760 (DF)

What does PowerShell remoting use to authenticate to another host in a domain environment?

A.

Two factor codes

B.

Unique application passwords

C.

PreShared keys

D.

Kerberos tickets

What is the following sequence of packets demonstrating?

A.

telnet.com.telnet > client.com.38060: F 4289:4289(0) ack 92 win 1024

B.

client.com.38060 > telnet.com.telnet: .ack 4290 win 8760 (DF)

C.

client.com.38060 > telnet.com.telnet: F 92:92(0) ack 4290 win 8760 (DF)

D.

telnet.com.telnet > client.com.38060: .ack 93 win 1024

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?

Each correct answer represents a complete solution. Choose two.

A.

The client can optionally authenticate the server.

B.

The client always authenticates the server.

C.

The server always authenticates the client.

D.

The server can optionally authenticate the client.

Which of the following heights of fence deters only casual trespassers?

A.

8 feet

B.

2 to 2.5 feet

C.

6 to 7 feet

D.

3 to 4 feet

What file instructs programs like Web spiders NOT to search certain areas of a site?

A.

Robots.txt

B.

Restricted.txt

C.

Spider.txt

D.

Search.txt

Which of the following statements best describes where a border router is normally placed?

A.

Between your firewall and your internal network

B.

Between your firewall and DNS server

C.

Between your ISP and DNS server

D.

Between your ISP and your external firewall

To update from a Windows Server Update Services (WSUS) server, users of the machine must have what rights, If any?

A.

No user tights are required

B.

Network User

C.

Local User

D.

Local Administrator

Which of the following choices accurately describes how PGP works when encrypting email?

A.

PGP encrypts the message with the recipients public key, then encrypts this key with a random asymmetric key.

B.

PGP creates a random asymmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

C.

PGP creates a random symmetric key that it uses to encrypt the message, then encrypts this key with the recipient's public key

D.

PGP encrypts the message with the recipients public key, then encrypts this key with a random symmetric key.

Page: 2 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved