GIAC Security Essentials Exam Practice Test

Page: 1 / 14
Total 385 questions
Question 1

Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap.

What is the source port number?



Answer : E


Question 2

Which asymmetric algorithm is used only for key exchange?



Answer : B


Question 3

Which of the following is a potential WPA3 security issue?



Answer : A


Question 4

What cryptographic technique does file Integrity monitoring employ?



Answer : B


Question 5

Which of the following consists of the security identifier number (SID) of your user account, the SID of all of your groups and a list of all your user rights?



Answer : C


Question 6

An email system administrator deploys a configuration blocking all inbound and outbound executable files due to security concerns.

What Defense in Depth approach is being used?



Answer : C


Question 7

What dots Office 365 use natively for authentication?



Answer : B, C


Page:    1 / 14   
Total 385 questions