Free GSEC Exam Dumps

Question 31

Which common firewall feature can be utilized to generate a forensic trail of evidence and
to identify attack trends against your network?

Correct Answer:C

Question 32

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Correct Answer:AB

Question 33

During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)?

Correct Answer:B

Question 34

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.uCertify.com. What is the most likely cause?

Correct Answer:A

Question 35

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

Correct Answer:D