Free GSEC Exam Dumps

Question 41

Which type of risk assessment results are typically categorized as low, medium, or high-risk events?

Correct Answer:B

Question 42

A folder D:FilesMarketing has the following NTFS permissions:
. Administrators: Full Control
. Marketing: Change and Authenticated
. Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
. Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \FILESERVERMARKETING shared folder?

Correct Answer:C

Question 43

Which of the following SIP methods is used to setup a new session and add a caller?

Correct Answer:D

Question 44

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we- are-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

Question 45

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.

Correct Answer:AC