GSEC GIAC Security Essentials With Complete
Solutions Latest Update
Backup Scheme You are writing a backup scheme. Your goal is to try to make certain
that you have speed to recovery but also to minimize the amount of storage space
needed for the backups as much as possible. Which backup scheme would you choose?
- ANSWER Full backups weekly; differential backup nightly afterward
You have some users that you want to grant permissions to one group or another. What
does Microsoft recommend that you do in order to accomplish this? - ANSWER Put the
users into a global group and then create a domain local group, granting permissions to
that domain local group.
Windows Firewall logs are stored in what format? - ANSWER W3C Extended Log format
What does Microsoft Windows Update use to check your system for updates? - ANSWER
ActiveX Control
You want to do some minimal filtering on your network interface but you do not want to
use the firewall. What could you do instead? - ANSWER Create an IPSec policy to do the
filtering.
You are dealing with a system that has an SID of S-1-15-32-545. What do you know about
that SID? -ANSWER Its the SID of the Users group.
You try to construct a batch file that makes modifications to the Windows registry. What
of the following would you use to invoke to edit the registry? -ANSWER regedit.exe
What would be considered the most important factor in cryptography? -ANSWER
Protecting the keys
, A very simple and popular form of encryption cipher is known as what - ANSWER A
rotation cipher
Public key algorithms are also known as what? - ANSWER Asymmetric cryptography
How many phases are there in IKE? - ANSWER Two
To verify a certificate being presented to you, what would you require? - ANSWER A CA
certificate
What would you use if you wanted to securely generate keys to exchange encrypted
information? - ANSWER Diffie-Hellman
A substitution steganography would use this part of a carrier file. - ANSWER The least
significant parts of the carrier
You see a certificate error from your Web browser. Which of the following is
If so, which is MOST likely to be the case? - ANSWER The digital signature of the CA on
the certificate is invalid.
What type of system does PGP depend on, to validate the identity of a certificate owner?
- ANSWER Web of Trust
The issue of trying to find a collision in a hash algorithm is what? - ANSWER A birthday
attack
The best method for securing data at rest is what? - ANSWER To encrypt it.
You have four possible strategies for mitigating a particular risk. Which of the following
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Braxton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.