100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

GSEC GIAC Security Essentials Question and answer latest update

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
22-05-2024
Written in
2023/2024

GSEC GIAC Security Essentials Question and answer latest update What class is the address 170.19.82.45? B In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23 indicate? The number of bits in the network portion of the address How many bits are in the NETWORK portion of the following address block: Address: 10.1.0.0 Subnet: 255.255.255.224 27 Question 4 What can you say about the following packet capture? 14:18:25.906002 .1000 > : S :(0) win 4096 14:18:26.094731 > .1000: S :(0) ack win 4096 14:18:26.172394 .1000 > : R :(0) win 0 14:18:26.507560 .999 > : S :(0) win 4096 14:18:26.694691 > .999: S :(0) ack win 4096 14:18:26.775037 .999 > : R :(0) win 0 14:18:26.775395 .999 > : R :(0) win 0 14:18:27.174846 > .998: S :(0) ack win 4096 This is a sequence number prediction attack. In the network 192.168.5.0/23, what would be the broadcast address? 192.168.5.255 If you see the IP address fe80::0050:8790:4554:2300/16, the :: indicates what? There are 0s between the ::. With the following IP header, what is the destination IP address: 45 00 03 3D 1E EB D E8 C0 A8 01 16 AD C2 4B 67 173.194.75.103 What is the order of messages in a three-way handshake? SYN, SYN/ACK, ACK Which utility makes use of ICMP to function? traceroute Which of the following is a private address (RFC1918)? 10.45.60.10 When you are deploying an intrusion prevention system on your network

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
May 22, 2024
Number of pages
12
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

GSEC GIAC Security Essentials Question and
answer latest update
What class is the address 170.19.82.45?
B


In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23 indicate?
The number of bits in the network portion of the address


How many bits are in the NETWORK portion of the following address block:
Address: 10.1.0.0
Subnet: 255.255.255.224
27


Question 4
What can you say about the following packet capture?
14:18:25.906002 apollo.it.luc.edu.1000 > x-terminal.shell: S
1382726990:1382726990(0) win 4096
14:18:26.094731 x-terminal.shell > apollo.it.luc.edu.1000: S
2021824000:2021824000(0) ack 1382726991 win 4096
14:18:26.172394 apollo.it.luc.edu.1000 > x-terminal.shell: R
1382726991:1382726991(0) win 0
14:18:26.507560 apollo.it.luc.edu.999 > x-terminal.shell: S
1382726991:1382726991(0) win 4096
14:18:26.694691 x-terminal.shell > apollo.it.luc.edu.999: S
2021952000:2021952000(0) ack 1382726992 win 4096
14:18:26.775037 apollo.it.luc.edu.999 > x-terminal.shell: R
1382726992:1382726992(0) win 0
14:18:26.775395 apollo.it.luc.edu.999 > x-terminal.shell: R
1382726992:1382726992(0) win 0
14:18:27.174846 x-terminal.shell > apollo.it.luc.edu.998: S
2022080000:2022080000(0) ack 1382726993 win 4096
This is a sequence number prediction attack.


In the network 192.168.5.0/23, what would be the broadcast address?
192.168.5.255


If you see the IP address fe80::0050:8790:4554:2300/16, the :: indicates what?
There are 0s between the ::.


With the following IP header, what is the destination IP address:
45 00 03 3D 1E EB 40 00 40 06 5D E8 C0 A8 01 16 AD C2 4B 67
173.194.75.103


What is the order of messages in a three-way handshake?
SYN, SYN/ACK, ACK


Which utility makes use of ICMP to function?
traceroute

, Which of the following is a private address (RFC1918)?
10.45.60.10


When you are deploying an intrusion prevention system on your network, what
is the most important criterion?
It has a low latency


A good example of a network using a mesh topology is:
The Internet


A border router would implement the following security control:
Access control lists to block broad categories of traffic.


You are implementing a star topology on your local network. What cabling are you most likely to use?
Twisted pair


Your IDS sends an alert about an incident on your network. The alert indicated that there was a
packet that had the same source and destination. This might normally indicate an attempt at a Land
attack, which is a very old attack. After investigating, you see that the source address is 0.0.0.0 and
the destination is 224.0.0.1. What would you consider this alert to be?
A false positive


These can be big challenges for intrusion detection systems.
Compression and encryption


This type of routing protocol uses the same algorithm as the navigation system in your car.
Link-state


You would implement an intrusion detection system to perform the following:
Detect intrusions.


You are seeing a lot of ARP responses with no corresponding ARP request. What are you most likely
seeing?
ARP spoofing


You have been asked to implement a security solution on your network to protect against employees
browsing Facebook during the work day. What would you implement?
A proxy server


What is the principle of least privilege implemented in?
The sudo utility


Authentication is the process of doing what?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4151
Last sold
3 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions