GSEC Exam Question 26

You are doing some analysis of malware on a Unix computer in a closed test network. The IP address of the computer is 192.168.1.120. From a packet capture, you see the malware is attempting to do a DNS query for a server called iamabadserver.com so that it can connect to it. There is no DNS server on the test network to do name resolution. You have another computer, whose IP is 192.168.1.115, available on the test network that you would like for the malware connect to it instead. How do you get the malware to connect to that computer on the test network?
  • GSEC Exam Question 27

    Adam works as a System Administrator for Umbrella Inc. The company has a Windows Server 2003 domain-based network. All client computers on the network run Windows 7 Ultimate. Andy, the manager of the sales department complains to Adam that he is not able to install accounting software on his computer. Adam checks the compatibility of the software with Windows 7, and all of the minimum requirements for running the software are met. He then checks for any domain or organizational policies, which are restricting the software to be installed. He finds out that none of the above is restricting the software to be installed. Adam suspects that the security policy of the local machine is affecting the installation. Adam wants to change the software access rights of Andy, so that it is determined by the access rights of the user. Which of the following Software restriction policies is used to accomplish the task?
  • GSEC Exam Question 28

    Which of the following is the FIRST step in performing an Operational Security (OP5EC) Vulnerabilities Assessment?
  • GSEC Exam Question 29

    Where are user accounts and passwords stored in a decentralized privilege management environment?
  • GSEC Exam Question 30

    Which of the following statements about IPSec are true?
    Each correct answer represents a complete solution. Choose two.