GSEC Exam Question 236
You have implemented a firewall on the company's network for blocking unauthorized network connections.
Which of the following types of security control is implemented in this case?
Which of the following types of security control is implemented in this case?
GSEC Exam Question 237
Which of the following statements about a hoax are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GSEC Exam Question 238
You have an automated system for patching the operating systems of all your computers. All patches are supposedly current. Yet your automated vulnerability scanner has just reported vulnerabilities that you believe have been patched. Which of the actions below should you take next?
GSEC Exam Question 239
What are the two actions the receiver of a PGP email message can perform that allows establishment of trust between sender and receiver?
GSEC Exam Question 240
Your system has been infected by malware. Upon investigation, you discover that the malware propagated primarily via email. The malware attacked known vulnerabilities for which patches are available, but due to problems with your configuration management system you have no way to know which systems have been patched and which haven't, slowing your progress in patching your network. Of the following, which solution would you use to protect against this propagation vector?