GSEC Exam Question 31
You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?
GSEC Exam Question 32
In trace route results, what is the significance of an * result?
GSEC Exam Question 33
Your organization has broken its network into several sections/segments, which are separated by firewalls, ACLs and VLANs. The purpose is to defend segments of the network from potential attacks that originate in a different segment or that attempt to spread across segments.
This style of defense-in-depth protection is best described as which of the following?
This style of defense-in-depth protection is best described as which of the following?
GSEC Exam Question 34
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
GSEC Exam Question 35
Which of the following connectivity devices is used to extend a network on a purely mechanical basis?