FREE GSEC MCQ Questions and Answers

0%

In the IPv4 header, where is the source address located?

Correct! Wrong!

In an IPv4 header, the source address is located at an offset of 12 bytes.

Which of the following protocols is based on UDP?

Correct! Wrong!

SNMP (Simple Network Management Protocol) is an UDP (User Datagram Protocol) based protocol. SNMP operates at the application layer of the TCP/IP protocol stack and uses UDP as the transport protocol for communication between SNMP entities.

Which of the following fire classes belongs to the Class C fire category?

Correct! Wrong!

Class C fires typically involve energized electrical equipment, such as electrical panels, wiring, appliances, and machinery. Therefore, electronic or computer fires fall under Class C fires. Class C fires are specific to electrical fires and require special considerations when it comes to extinguishing them.

Which of the following measures how a disaster might affect people over time?

Correct! Wrong!

BIA assesses the potential consequences of a disruption on critical business operations, services, and processes. This includes evaluating the impact on productivity, customer service, revenue generation, and regulatory compliance.

What database is capable of offering contact details for Internet domains?

Correct! Wrong!

The "Whois" database can provide contact information for internet domains. Whois is a widely-used internet protocol that allows users to query a database and retrieve information about domain names, IP addresses, and other internet resources. The database contains details about the registered owner, registrar, administrative and technical contacts, registration and expiration dates, and other relevant information associated with a domain name.

Which of the following protocols best explains how H.323's security works?

Correct! Wrong!

The H.235 protocol family describes the operation of security mechanisms in the H.323 communication protocol suite. H.323 is a set of ITU-T standards that govern the transmission of multimedia communication over IP-based networks, such as voice and video conferencing.

Which of the following describes a hashing operation's characteristics?

Correct! Wrong!

A hash function is a mathematical algorithm that takes an input (message or data) and produces a fixed-size output, commonly referred to as a hash value, hash code, or digest. The output size of a hash function is typically predetermined by the specific hash algorithm used, and it remains constant for a given hash algorithm.