GSEC Exam Question 66

During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)?
  • GSEC Exam Question 67

    Which of the following is a characteristic of hash operations?
  • GSEC Exam Question 68

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.
    John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?
    Each correct answer represents a complete solution. Choose all that apply.
  • GSEC Exam Question 69

    You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?
  • GSEC Exam Question 70

    When trace route fails to get a timely response for a packet after three tries, which action will it take?