Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSEC GIAC Security Essentials Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSEC GIAC Security Essentials certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 6
Total 385 questions

Which of the following is the FIRST step in performing an Operational Security (OP5EC) Vulnerabilities Assessment?

A.

Assess the threat

B.

Assess vulnerabilities of critical information to the threat

C.

Conduct risk versus benefit analysis

D.

Implement appropriate countermeasures

E.

Identification of critical information

When an IIS filename extension is mapped, what does this mean?

A.

Files with the mapped extensions cannot be interpreted by the web server.

B.

The file and all the data from the browser's request are handed off to the mapped interpreter.

C.

The files with the mapped extensions are interpreted by CMD.EXE.

D.

The files with the mapped extensions are interpreted by the web browser.

What is the most secure way to address an unused Windows service so it cannot be exploited by malware?

A.

Firewall it

B.

Set to manual startup

C.

Disable it

D.

Uninstall it

How many clients Is a single WSUS server designed to support when the minimum system requirements are met?

A.

10000

B.

B. 5OOO

C.

1000

What is a characteristic of iOS security?

A.

Most security features are user configurable

B.

Less restrictive architecture than macOS

C.

Flaw disclosures are sent to the Open Handset Alliance (OHA)

D.

Forbids mobile operator (MO) software

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

A.

nice -n 19 cc -c *.c &

B.

nice cc -c *.c &

C.

nice -n -20 cc -c *.c &

D.

nice cc -c *.c

What would the following IP tables command do?

IP tables -I INPUT -s 99.23.45.1/32 -j DROP

A.

Drop all packets from the source address

B.

Input all packers to the source address

C.

Log all packets to or from the specified address

D.

Drop all packets to the specified address

Use nmap to discover a host on the 10.10.10.0/24 network, scanning only port 8082 and using the SYN or Stealth scan approach. Which host has a service called -blackice-alerts"?

A.

10.10.10.115

B.

10.10.10.80

C.

10.10.10.5

D.

10.10.10

E.

10.10.10.30

F.

10.10.10.164

G.

10.10.10.37

Based on the iptables output below, which type of endpoint security protection has host 192.168.1.17 implemented for incoming traffic on TCP port 22 (SSH) and TCP port 23 (telnet)?

A.

Operating System Control Firewall

B.

Application Control Firewall

C.

Exclusive Logging Analysis

D.

Packet Filtering Firewall

E.

Application Execution Control

When designing wireless networks, one strategy to consider is implementing security mechanisms at all layers of the OSI model. Which of the following protection mechanisms would protect layer 1?

A.

Hardening applications

B.

Limit RF coverage

C.

Employing firewalls

D.

Enabling strong encryption

What is TRUE about Workgroups and Domain Controllers?

A.

By default all computers running Windows 2008 can only form Domain Controllers not Workgroups

B.

Workgroups are characterized by higher costs while Domain Controllers by lower costs

C.

You cannot have stand-alone computers in the midst of other machines that are members of a domain

D.

Workgroup computers cannot share resources, only computers running on the same domain can

E.

You can have stand-alone computers in the midst of other machines that are members of a domain.

What is the SHA1 hash of the Ale /bin/Is?

A.

a895bac9c3

B.

54771b4r

C.

a39bed3C496fC764fc518d3e2d56f7d0f4C625fb

D.

93c1 ffbd22ebcad798886fb4aa46fa 357b23d80a

E.

aa40739f465ded2245872b1e4972e33d5bObb1cb

F.

494a 192859f 244c69d5bdc46255d b44l9e 7d051 f

G.

d3a21675a8f 19518d8b8f3cefOf6a21 del da6cc7

Included below is the output from a resource kit utility run against local host.

Which command could have produced this output?

A.

Schtasks

B.

Task kill

C.

SC

D.

Task list

Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?

A.

Hotfix

B.

Spam

C.

Biometrics

D.

Buffer overflow

What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

A.

SCHTASKS.EXE

B.

SCHEDULETSKS.EXE

C.

SCHEDULR.EXE

D.

SCHRUN.EXE

What is the name of the registry key that is used to manage remote registry share permissions for the whole registry?

A.

regkey

B.

regmng

C.

winreg

D.

rrsreg

What dots Office 365 use natively for authentication?

A.

Microsoft CHAP

B.

Exchange Online

C.

Azure Active Directory

D.

Central Authentication Service

E.

Extensible Authentication Protocol

Which of the following tools is used to query the DNS servers to get detailed information about IP addresses, MX records, and NS servers?

A.

NBTSTAT

B.

NSLOOKUP

C.

PING

D.

NETSTAT

You work as a Network Administrator for McNeil Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

A.

The laptop users will be able to use smart cards for getting authenticated.

B.

Both tasks will be accomplished.

C.

None of the tasks will be accomplished.

D.

The wireless network communication will be secured.

In a /24 subnet, which of the following is a valid broadcast address?

A.

200.11.11.1

B.

221.10.10.10

C.

245.20.30.254

D.

192.10.10.255

Page: 4 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved