GSEC Exam Question 191

Why would someone use port 80 for deployment of unauthorized services?
  • GSEC Exam Question 192

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
  • GSEC Exam Question 193

    Which Linux file lists every process that starts at boot time?
  • GSEC Exam Question 194

    What would the following IP tables command do?
    IP tables -I INPUT -s 99.23.45.1/32 -j DROP
  • GSEC Exam Question 195

    Which of the following choices accurately describes how PGP works when encrypting email?