GSEC GIAC
Latest uploads at GSEC GIAC. Looking for notes at GSEC GIAC? We have lots of notes, study guides and study notes available for your school.
-
17
- 0
-
3
All courses for GSEC GIAC
-
GSEC GIAC 17
Latest content GSEC GIAC
SANS SEC401 Question and answer latest update 
Conceptual Design (network architecture) 
Includes the core components of a network architecture 
 
Will consider OS platforms, server services, critical core operational functions, etc. 
 
Helps to understand the overall purpose the network ('WHY' we have it and the "WHAT' it helps us to achieve) 
 
May utilize the concept of "closed-box" diagramming 
 
 
TTP 
Tactics 
Techniques 
Procedures 
 
 
Logical design (network architecture) 
Represe...
- Exam (elaborations)
- • 53 pages's •
-
GSEC GIAC•GSEC GIAC
Preview 4 out of 53 pages
Getting your document ready...
SANS SEC401 Question and answer latest update 
Conceptual Design (network architecture) 
Includes the core components of a network architecture 
 
Will consider OS platforms, server services, critical core operational functions, etc. 
 
Helps to understand the overall purpose the network ('WHY' we have it and the "WHAT' it helps us to achieve) 
 
May utilize the concept of "closed-box" diagramming 
 
 
TTP 
Tactics 
Techniques 
Procedures 
 
 
Logical design (network architecture) 
Represe...
GSEC GIAC Security Essentials Question and answer latest update 
What class is the address 170.19.82.45? 
B 
 
 
In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23 indicate? 
The number of bits in the network portion of the address 
 
 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
27 
 
 
Question 4 
What can you say about the following packet capture? 
14:18:25.906002 .1000 > : S 
:(0) win 4096...
- Exam (elaborations)
- • 12 pages's •
-
GSEC GIAC•GSEC GIAC
Preview 2 out of 12 pages
Getting your document ready...
GSEC GIAC Security Essentials Question and answer latest update 
What class is the address 170.19.82.45? 
B 
 
 
In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23 indicate? 
The number of bits in the network portion of the address 
 
 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
27 
 
 
Question 4 
What can you say about the following packet capture? 
14:18:25.906002 .1000 > : S 
:(0) win 4096...
GSEC GIAC Security Essentials Study Guide Question and answer latest update 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
 
A. 27 
B. 32 
C. 24 
D. 29 
A. 27 
 
 
What class is the address 170.19.82.45? 
 
A. Class C 
B. Class A 
C. Class B 
D. Class D 
C. Class B 
 
 
Which utility makes use of ICMP to function? 
 
A. traceroute 
B. whasup 
C. icmpstat 
D. netstat 
A. traceroute 
 
 
In the network 192.168.5.0/23, what wou...
- Exam (elaborations)
- • 24 pages's •
-
GSEC GIAC•GSEC GIAC
Preview 3 out of 24 pages
Getting your document ready...
GSEC GIAC Security Essentials Study Guide Question and answer latest update 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
 
A. 27 
B. 32 
C. 24 
D. 29 
A. 27 
 
 
What class is the address 170.19.82.45? 
 
A. Class C 
B. Class A 
C. Class B 
D. Class D 
C. Class B 
 
 
Which utility makes use of ICMP to function? 
 
A. traceroute 
B. whasup 
C. icmpstat 
D. netstat 
A. traceroute 
 
 
In the network 192.168.5.0/23, what wou...
GSEC Exam Study Question and answer latest update 
What are the layers of the OSI Model from top to bottom? 
Application, Presentation, Session, Transport, Network, Data Link and Physical 
 
 
What are the layers of the TCP/IP Model from top to bottom? 
Application, Transport, Internet and Link Layer 
 
 
What is the address space used for loopback addressing? 
127.0.0.0 - 127.255.255.255 
 
 
What is the address space used when a DHCP server is not available? 
169.254.0.1 - 169.254.255.255 
 
 ...
- Exam (elaborations)
- • 103 pages's •
-
GSEC GIAC•GSEC GIAC
Preview 4 out of 103 pages
Getting your document ready...
GSEC Exam Study Question and answer latest update 
What are the layers of the OSI Model from top to bottom? 
Application, Presentation, Session, Transport, Network, Data Link and Physical 
 
 
What are the layers of the TCP/IP Model from top to bottom? 
Application, Transport, Internet and Link Layer 
 
 
What is the address space used for loopback addressing? 
127.0.0.0 - 127.255.255.255 
 
 
What is the address space used when a DHCP server is not available? 
169.254.0.1 - 169.254.255.255 
 
 ...
GIAC Certifications Question and answer latest update 
GISF 
TITLE: 
INFORMATION SECURITY ESSENTIALS 
 
COURSE: 
SEC301: Intro to Information Security 
 
 
GICSP 
TITLE: 
GLOBAL INDUSTRIAL CYBERSECURITY PROFESSIONAL 
 
COURSE: 
ICS410: ICS/SCADA Security Essentials 
 
 
GSEC 
TITLE: 
SECURITY ESSENTIALS CERTIFICATION 
 
COURSE: 
Security Essentials Bootcamp 
 
 
GISP 
TITLE: 
INFORMATION SECURITY PROFESSIONAL 
 
COURSE: 
MGT414: SANS Training for CISSP Exam 
 
 
GCFE 
TITLE: 
CERTIFIED FORENSIC ...
- Exam (elaborations)
- • 4 pages's •
-
GSEC GIAC•GSEC GIAC
Preview 1 out of 4 pages
Getting your document ready...
GIAC Certifications Question and answer latest update 
GISF 
TITLE: 
INFORMATION SECURITY ESSENTIALS 
 
COURSE: 
SEC301: Intro to Information Security 
 
 
GICSP 
TITLE: 
GLOBAL INDUSTRIAL CYBERSECURITY PROFESSIONAL 
 
COURSE: 
ICS410: ICS/SCADA Security Essentials 
 
 
GSEC 
TITLE: 
SECURITY ESSENTIALS CERTIFICATION 
 
COURSE: 
Security Essentials Bootcamp 
 
 
GISP 
TITLE: 
INFORMATION SECURITY PROFESSIONAL 
 
COURSE: 
MGT414: SANS Training for CISSP Exam 
 
 
GCFE 
TITLE: 
CERTIFIED FORENSIC ...
Cybersecurity Essentials Chapter 1 Question and answer latest update 
Google, Facebook, LinkedIn 
Examples of data domains 
 
 
IoT 
Internet of Things 
 
 
GIS 
Geospatial Information Systems 
 
 
White Hat Hackers 
Legalized hackers who are payed to find vulnerabilities 
 
 
Grey Hat Hackers 
Hackers who perform illegal actions, but not for personal gain or to cause damage 
 
 
Black Hat Hackers 
Illegal hackers who hack for personal gain 
 
 
Script Kiddies 
Hackers having little or no skill,...
- Package deal
- Exam (elaborations)
- • 2 pages's •
-
GSEC GIAC•GSEC GIAC
-
GSEC GIAC Security Essentials Complete Exam Bundle• By LectAziim
Preview 1 out of 2 pages
Getting your document ready...
Cybersecurity Essentials Chapter 1 Question and answer latest update 
Google, Facebook, LinkedIn 
Examples of data domains 
 
 
IoT 
Internet of Things 
 
 
GIS 
Geospatial Information Systems 
 
 
White Hat Hackers 
Legalized hackers who are payed to find vulnerabilities 
 
 
Grey Hat Hackers 
Hackers who perform illegal actions, but not for personal gain or to cause damage 
 
 
Black Hat Hackers 
Illegal hackers who hack for personal gain 
 
 
Script Kiddies 
Hackers having little or no skill,...
Cyber Security Assessment questions 1,2,and 3 Question and answer latest update 
Threats,Attacks,and vulnerabilities are __________% in weighting 
22% 
 
 
Organizations think of security in terms of fitting ___________ ________ ___________ 
Locks on doors 
 
 
Businesses do not make money by being secure. Rather Security protects the __________ of a company 
assets 
 
 
What is a tangible asset? 
A. Physical items such as buildings,furniture,computer equipment,etc... 
 
B. An asset that has acc...
- Package deal
- Exam (elaborations)
- • 4 pages's •
-
GSEC GIAC•GSEC GIAC
-
GSEC GIAC Security Essentials Complete Exam Bundle• By LectAziim
Preview 1 out of 4 pages
Getting your document ready...
Cyber Security Assessment questions 1,2,and 3 Question and answer latest update 
Threats,Attacks,and vulnerabilities are __________% in weighting 
22% 
 
 
Organizations think of security in terms of fitting ___________ ________ ___________ 
Locks on doors 
 
 
Businesses do not make money by being secure. Rather Security protects the __________ of a company 
assets 
 
 
What is a tangible asset? 
A. Physical items such as buildings,furniture,computer equipment,etc... 
 
B. An asset that has acc...
SANS SEC401 Question and answer latest update 
Conceptual Design (network architecture) 
Includes the core components of a network architecture 
 
Will consider OS platforms, server services, critical core operational functions, etc. 
 
Helps to understand the overall purpose the network ('WHY' we have it and the "WHAT' it helps us to achieve) 
 
May utilize the concept of "closed-box" diagramming 
 
 
TTP 
Tactics 
Techniques 
Procedures 
 
 
Logical design (network architecture) 
Represe...
- Package deal
- Exam (elaborations)
- • 53 pages's •
-
GSEC GIAC•GSEC GIAC
-
GSEC GIAC Security Essentials Complete Exam Bundle• By LectAziim
Preview 4 out of 53 pages
Getting your document ready...
SANS SEC401 Question and answer latest update 
Conceptual Design (network architecture) 
Includes the core components of a network architecture 
 
Will consider OS platforms, server services, critical core operational functions, etc. 
 
Helps to understand the overall purpose the network ('WHY' we have it and the "WHAT' it helps us to achieve) 
 
May utilize the concept of "closed-box" diagramming 
 
 
TTP 
Tactics 
Techniques 
Procedures 
 
 
Logical design (network architecture) 
Represe...
GSEC GIAC Security Essentials Question and answer latest update 
What class is the address 170.19.82.45? 
B 
 
 
In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23 indicate? 
The number of bits in the network portion of the address 
 
 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
27 
 
 
Question 4 
What can you say about the following packet capture? 
14:18:25.906002 .1000 > : S 
:(0) win 4096...
- Package deal
- Exam (elaborations)
- • 12 pages's •
-
GSEC GIAC•GSEC GIAC
-
GSEC GIAC Security Essentials Complete Exam Bundle• By LectAziim
Preview 2 out of 12 pages
Getting your document ready...
GSEC GIAC Security Essentials Question and answer latest update 
What class is the address 170.19.82.45? 
B 
 
 
In the address ab00:fc87:234a:0090:5120:ffab:bc8a:0098/23, what does the /23 indicate? 
The number of bits in the network portion of the address 
 
 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
27 
 
 
Question 4 
What can you say about the following packet capture? 
14:18:25.906002 .1000 > : S 
:(0) win 4096...
GSEC GIAC Security Essentials Study Guide Question and answer latest update 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
 
A. 27 
B. 32 
C. 24 
D. 29 
A. 27 
 
 
What class is the address 170.19.82.45? 
 
A. Class C 
B. Class A 
C. Class B 
D. Class D 
C. Class B 
 
 
Which utility makes use of ICMP to function? 
 
A. traceroute 
B. whasup 
C. icmpstat 
D. netstat 
A. traceroute 
 
 
In the network 192.168.5.0/23, what wou...
- Package deal
- Exam (elaborations)
- • 24 pages's •
-
GSEC GIAC•GSEC GIAC
-
GSEC GIAC Security Essentials Complete Exam Bundle• By LectAziim
Preview 3 out of 24 pages
Getting your document ready...
GSEC GIAC Security Essentials Study Guide Question and answer latest update 
How many bits are in the NETWORK portion of the following address block: 
Address: 10.1.0.0 
Subnet: 255.255.255.224 
 
A. 27 
B. 32 
C. 24 
D. 29 
A. 27 
 
 
What class is the address 170.19.82.45? 
 
A. Class C 
B. Class A 
C. Class B 
D. Class D 
C. Class B 
 
 
Which utility makes use of ICMP to function? 
 
A. traceroute 
B. whasup 
C. icmpstat 
D. netstat 
A. traceroute 
 
 
In the network 192.168.5.0/23, what wou...