Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GSEC GIAC Security Essentials Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSEC GIAC Security Essentials certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 385 questions

Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

A.

Anonymous authentication

B.

Mutual authentication

C.

Open system authentication

D.

Shared key authentication

What method do Unix-type systems use to prevent attackers from cracking passwords using pre-computed hashes?

A.

Unix systems can prevent users from using dictionary words for passwords

B.

The algorithms creates hashes using a CPU- intensive algorithm.

C.

The algorithm creates hashes using salts or randomized values

D.

Unix/Linux systems use hashing functions which cannot be reversed

E.

The system encrypts the password using a symmetrical algorithm

You are examining an IP packet with a header of 40 bytes in length and the value at byte 0 of the packet header is 6. Which of the following describes this packet?

A.

This is an IPv4 packet; the protocol encapsulated in the payload is unspecified.

B.

This is an IPv4 packet with a TCP payload.

C.

This is an IPv6 packet; the protocol encapsulated in the payload is unspecified.

D.

This is an IPv6 packet with a TCP payload.

Which of the following protocols provides maintenance and error reporting function?

A.

UDP

B.

ICMP

C.

PPP

D.

IGMP

One of your Linux systems was compromised last night. According to change management history and a recent vulnerability scan, the system's patches were up-to-date at the time of the attack. Which of the following statements is the Most Likely explanation?

A.

It was a zero-day exploit.

B.

It was a Trojan Horse exploit.

C.

It was a worm exploit.

D.

It was a man-in-middle exploit.

Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

A.

Both volumes should be converted to NTFS at install time.

B.

First volume should be FAT32 and second volume should be NTFS.

C.

First volume should be EFS and second volume should be FAT32.

D.

Both volumes should be converted to FAT32 with NTFS DACLs.

What is the discipline of establishing a known baseline and managing that condition known as?

A.

Condition deployment

B.

Observation discipline

C.

Security establishment

D.

Configuration management

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

A.

The Security ID numbers (SIDs) of all the groups to which you belong

B.

A list of cached authentications

C.

A list of your domain privileges

D.

The Security ID numbers (SIDs) of all authenticated local users

Which of the following radio frequencies is used by the IEEE 802.11a wireless network?

A.

3.7 GHz

B.

7.0 GHz

C.

2.4 GHz

D.

5.0 GHz

Which of the following is Azure's version of a superuser?

A.

Network administrator

B.

Global administrator

C.

Security administrator

D.

Intune administrator

Which of the following quantifies the effects of a potential disaster over a period of time?

A.

Risk Assessment

B.

Business Impact Analysis

C.

Disaster Recovery Planning

D.

Lessons Learned

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses Internet Protocol (IP) for data integrity.

B.

It uses Authentication Header (AH) for data integrity.

C.

It uses Password Authentication Protocol (PAP) for user authentication.

D.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.

This style of defense-in-depth protection is best described as which of the following?

A.

Uniform protection

B.

Protected enclaves

C.

Vector-oriented

D.

Information-centric

You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

A.

Limits on the number of failed logins

B.

Boundary checks on program inputs

C.

Controls against time of check/time of use attacks

D.

Restrictions on file permissions

Analyze the following screenshot. What conclusion can be drawn about the user account shown?

A.

The user is a domain administrator

B.

The user has a guest privilege level

C.

The user is a local administrator

D.

The user is not authenticated on the domain

Which of the following statements would describe the term "incident" when used in the branch of security known as Incident Handling?

A.

Any observable network event

B.

Harm to systems

C.

Significant threat of harm to systems

D.

A and C

E.

A, B, and C

F.

B and C

G.

A and B

The TTL can be found in which protocol header?

A.

It is found in byte 8 of the ICMP header.

B.

It is found in byte 8 of the IP header.

C.

It is found in byte 8 of the TCP header.

D.

It is found in byte 8 of the DNS header.

Which of the following consists of the security identifier number (SID) of your user account, the SID of all of your groups and a list of all your user rights?

A.

Discretionary Access Control List (DACL)

B.

Access Control Entry (ACE)

C.

Security Access Token (SAT}

D.

System Access Control List (SACL)

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are optimizing performance and security on your Web server. You want to know the ports that are listening to FTP. Which of the following commands will you use?

A.

netstat -a | grep FTP

B.

FTP netstat -r

C.

FTP netstat -a

D.

netstat -r | grep FTP

What is the first thing that should be done during the containment step of incident handling?

A.

Change all the passwords

B.

Secure the area

C.

Prepare the Jump bag

D.

Notify management

E.

Prepare a report

Page: 1 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved