GSEC Exam Question 131
Your CIO has found out that it is possible for an attacker to clone your company's RFID (Radio Frequency ID) based key cards. The CIO has tasked you with finding a way to ensure that anyone entering the building is an employee. Which of the following authentication types would be the appropriate solution to this problem?
GSEC Exam Question 132
You want to temporarily change your primary group to another group of which you are a member. In this
process, a new shell will be created, and when you exit the shell, your previous group will be reinstated.
Which of the following commands will you use to accomplish this task?
process, a new shell will be created, and when you exit the shell, your previous group will be reinstated.
Which of the following commands will you use to accomplish this task?
GSEC Exam Question 133
There is not universal agreement on the names of the layers in the TCP/IP networking model. Which of the following is one of the functions of the bottom layer which is sometimes called the Network Access or Link Layer?
GSEC Exam Question 134
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Select and place the authentication method you are required to configure to implement the security policy of the company.
GSEC Exam Question 135
Which Defense-in-Depth principle starts with an awareness of the value of each section of information within an organization?