GSEC Exam Question 66
During which of the following steps is the public/private key-pair generated for Public Key Infrastructure (PKI)?
GSEC Exam Question 67
Which of the following is a characteristic of hash operations?
GSEC Exam Question 68
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.
John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
GSEC Exam Question 69
You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?
GSEC Exam Question 70
When trace route fails to get a timely response for a packet after three tries, which action will it take?