FREE GSEC Trivia Questions and Answers

0%

What does the following series of packets demonstrate?

Correct! Wrong!

This packet indicates that the client (client.com) is initiating the connection teardown by sending a TCP segment with the FIN (Finish) flag set. The sequence number and acknowledgment number both have a value of 92, indicating that the client has received all data up to sequence number 92 from the server.

Which of the following programming languages enables cookie storage on client computers?

Correct! Wrong!

JavaScript is a programming language that runs on the client-side within a web browser. It provides APIs (Application Programming Interfaces) that allow programmers to manipulate and interact with browser features, including storing and retrieving cookies on client computers. The document.cookie object in JavaScript enables reading, writing, and modifying cookies.

Which of the following advantages of private circuits over VPNs?

Correct! Wrong!

Performance guarantees can be considered an advantage of private circuits over VPNs (Virtual Private Networks). Private circuits, such as leased lines or dedicated connections, offer dedicated and exclusive bandwidth for communication between locations or networks.

Which of the following must be present for an 802.lx network authentication to be successful?

Correct! Wrong!

The term "supplicant" refers to the client device or software that initiates the authentication process in a network using the IEEE 802.1X standard. While a supplicant is not a mandatory component for all network authentication methods, it is indeed a required component for successful 802.1X network authentication.

Which of the following networking topologies connects computers via a hub?

Correct! Wrong!

In a star topology, all network cables run from each device directly to the central switch, forming a pattern that resembles a star. This central switch acts as a central point of control and allows for individual communication between each device and the network.

What mode is used by Network Intrusion Detection Systems (NIDS) to operate network cards when capturing traffic for analysis?

Correct! Wrong!

Promiscuous mode is a setting that allows a network interface card (NIC) to capture and inspect all network traffic passing through the network segment to which it is connected. In promiscuous mode, the NIC bypasses the usual filtering and only captures packets specifically addressed to it. Instead, it captures all packets on the network, including those intended for other devices.

Among the books listed below, which one addresses confidentiality?

Correct! Wrong!

The Orange Book, formally known as "Trusted Computer System Evaluation Criteria," is a document published by the United States Department of Defense (DoD) in the 1980s. It provides a framework for evaluating and classifying the security features and capabilities of computer systems.

Premium Tests $49/mo
FREE November-2024