GSEC Exam

FREE GSEC Questions and Answers

0%

Which of the following protocols is used by a host to ask a server for its own IP address when it is aware of its own MAC (Media Access Control) address?

Correct! Wrong!

The Reverse Address Resolution Protocol (RARP) is an obsolete networking protocol used in some older computer systems to obtain an IP address when the host knows its own MAC (Media Access Control) address.

You oversee security for a website that conducts offshore banking. What is the most important thing to think about from a business standpoint before applying your new vulnerability scanner to the company's business systems?

Correct! Wrong!

Before running a vulnerability scanner against the company's business systems, a major factor to consider from a business perspective is the possibility of generating false positive results. False positives are findings that erroneously indicate the presence of vulnerabilities or security issues when, in fact, there are none.

Which of the following would be given to a DHCP scope on a private LAN as a private, RFC 1918 compliant IP address?

Correct! Wrong!

The IP address 10.254.1.50 is within the private IP address range defined by RFC 1918. This range is reserved for use in private networks and is not routable on the public internet. Specifically, the range 10.0.0.0 to 10.255.255.255 falls under the Class A private IP address block.

Which of the following pertains to using Cygwin for Windows as a benefit?

Correct! Wrong!

Cygwin is a compatibility layer that allows running Linux and Unix-like applications on Windows systems. While Cygwin provides a range of benefits for Windows users, it is important to note that it does not enable the installation of a complete Red Hat operating system on Windows. Cygwin provides a Unix-like environment and a collection of software tools, but it does not replicate the full functionality and capabilities of a complete operating system like Red Hat.

The same web server on the same network can be simultaneously accessed by two clients connecting from the same public IP address (for example, behind the same NAT firewall).
What is a TRUE condition for the Internet?

Correct! Wrong!

The condition that must be true for two clients connecting from the same public IP address (behind the same NAT firewall) to simultaneously connect to the same web server on the Internet is that the client-side source ports must be different.
In the context of NAT (Network Address Translation), when multiple devices within a private network share a single public IP address, the NAT firewall translates the source IP addresses and ports of the devices to the public IP address and assigns unique source ports to each connection.

What is the purpose of SYN/FIN scanning?

Correct! Wrong!

SYN scanning involves sending a series of TCP SYN packets to different ports on a target system. By analyzing the responses received, the scanning entity can determine whether a port is open, closed, or filtered by a firewall. It is a popular scanning technique due to its efficiency and ability to bypass certain firewall configurations.

What technical measure offers the most important line of defense in the event that an intruder manages to get cassettes holding vital information despite circumventing all physical security measures?

Correct! Wrong!

Encryption control can provide a critical layer of defense if an intruder bypasses all physical security controls and gains access to tapes containing critical data. Even if an attacker manages to obtain the physical storage media, encrypted data remains protected and inaccessible without the encryption key.