Question 7

Which of the following Unix syslog message priorities is the MOST severe?

Correct Answer:B

Question 8

What database can provide contact information for Internet domains?

Correct Answer:C

Question 9

What is the function of the TTL (Time to Live) field in IPv4 and the Hop Limit field in IPv6 In an IP Packet header?

Correct Answer:A

Question 10

You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?

Correct Answer:C

Question 11

Which port category does the port 110 fall into?

Correct Answer:A

Question 12

Which of the following is a signature-based intrusion detection system (IDS) ?

Correct Answer:B

START GSEC EXAM