GSEC COMPLETE STUDY GUIDE TEST.
When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted toPGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process? - ...
GSEC COMPLETE STUDY GUIDE TEST.
When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step
process. First, the message to be signed is submitted toPGP's cryptographic hash algorithm. What is one
of the hash algorithms used by PGP for this process? - CORRECT ANSWER SHA-l
You are the security director for an off-shore banking site. From a business perspective, what is a major
factor to consider before running your new vulnerability scanner against the company's business
systems? - CORRECT ANSWER It may generate false positive results
Which of the following is a benefit to utilizing Cygwin for Windows? - CORRECT ANSWER The ability to
install a complete Red Hat operating system Install on Windows.
What technical control provides the most critical layer of defense if an intruder is able to bypass all
physical security controls and obtain tapes containing critical data? - CORRECT ANSWER Encryption
Two clients connecting from the same public IP address (for example - behind the same NAT firewall)
can connect simultaneously to the same web server on theInternet, provided what condition is TRUE? -
CORRECT ANSWER The client-side source ports are different.
Which of the following is a standard Unix command that would most likely be used to copy raw file
system data for later forensic analysis? - CORRECT ANSWER dd
Which of the following is NOT a recommended best practice for securing Terminal Services and Remote
Desktop? - CORRECT ANSWER Make sure to allow all TCP 3389 traffic through the external firewall.
When an IIS filename extension is mapped, what does this mean? - CORRECT ANSWER The file and all
the data from the browser's request are handed off to the mapped interpreter.
Which Linux file lists every process that starts at boot time? - CORRECT ANSWER inittab
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursewendo. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.