Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSEC GIAC Security Essentials Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSEC GIAC Security Essentials certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 385 questions

The TTL can be found in which protocol header?

A.

UDP

B.

TCP

C.

IP

D.

ICMP

Which of the following is NOT typically used to mitigate the war dialing threat?

A.

Setting up monitored modems on special phone numbers

B.

Setting modems to auto-answer mode

C.

Proactively scanning your own phone numbers

D.

Monitoring call logs at the switch

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

A.

rm private.txt #11 Nov 2009 02:59:58 am

B.

touch -d "11 Nov 2009 02:59:58 am" private.txt

C.

touch private.txt #11 Nov 2009 02:59:58 am

D.

touch -t 200911110259.58 private.txt

The Windows 'tracert' begins by sending what type of packet to the destination host?

A.

A UDP packet with a TTL of 1

B.

An ICMP Echo Request

C.

An ICMP Router Discovery

D.

An ICMP Echo Reply

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A.

443

B.

22

C.

21

D.

80

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

SSL

B.

HTTP

C.

TLS

D.

SNMP

A security analyst has entered the following rule to detect malicious web traffic:

alert tcp any -> 192.168.1.0/24 SO (msg: Attempted SQL Injection!"; sld:20000O01;)

How can this rule be changed to reduce false positives?

A.

Change the rule to make it apply bi -directional to source and destination

B.

Add more detail in the rule to make it more specific to the attack pattern

C.

Add an additional rule to apply to destination port 443 as well as 80

D.

Make the IP range more general so that it applies to all webservers

What Windows log should be checked to troubleshoot a Windows service that is falling to start?

A.

Application

B.

System

C.

Security

D.

Setup

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).

You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

A.

Copy the files to a network share on an NTFS volume.

B.

Copy the files to a network share on a FAT32 volume.

C.

Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

D.

Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

A.

Camera Recordings

B.

Security guards

C.

Encryption

D.

Shredding

E.

Corrective Controls

Fill in the blank with the correct answer to complete the statement below.

The permission is the minimum required permission that is necessary for a user to enter a directory and list its contents.

A Windows administrator wants to automate local and remote management tasks in Active Directory. Which tool is most appropriate for this?

A.

Ipsec

B.

VisualBasic

C.

PowerShell

D.

netsh

E.

ipconfig

A new data center is being built where customer credit information will be processed and stored. Which of the following actions will help maintain the confidentiality of the data?

A.

Environmental sensors in the server room

B.

Access control system for physical building

C.

Automated fire detection and control systems

D.

Frequent off-site backup of critical databases

Which of the following statements about Microsoft's VPN client software is FALSE?

A.

The VPN interface can be figured into the route table.

B.

The VPN interface has the same IP address as the interface to the network it's been specified to protect.

C.

The VPN client software is built into the Windows operating system.

D.

The VPN tunnel appears as simply another adapter.

Which of the following is an advantage of an Intrusion Detection System?

A.

It is a mature technology.

B.

It is the best network security.

C.

It never needs patching.

D.

It is a firewall replacement.

Which of the following statements about Secure Sockets Layer (SSL) are true? Each correct answer represents a complete solution. Choose two.

A.

It provides communication privacy, authentication, and message integrity.

B.

It provides mail transfer service.

C.

It uses a combination of public key and symmetric encryption for security of data.

D.

It provides connectivity between Web browser and Web server.

Which of the following is a private, RFC 1918 compliant IP address that would be assigned to a DHCP scope on a private LAN?

A.

127.0.0.100

B.

169.254.1.50

C.

10.254.1.50

D.

172.35.1.100

Analyze the file below. When will the program /home/sink/utils/remove temp hies.py run?

A.

When a user requests it by connecting to the listening port

B.

When the user 'sink' logs in

C.

At startup when the system enters the multi-user runlevel

D.

At the time specified in the crontab file

Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?

A.

NSLOOKUP

B.

IPCONFIG

C.

ARP

D.

IFCONFIG

Which of the following protocols describes the operation of security In H.323?

A.

H.239

B.

H.245

C.

H.235

D.

H.225

Page: 5 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved