Question 19

Which of the following applications cannot proactively detect anomalies related to a computer?

Correct Answer:B

Question 20

Why are false positives such a problem with IPS technology?

Correct Answer:D

Question 21

Which of the following files contains the shadowed password entries in Linux?

Correct Answer:B

Question 22

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?
Each correct answer represents a complete solution. Choose two.

Correct Answer:CD

Question 23

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.

Correct Answer:AC

Question 24

When Net Stumbler is initially launched, it sends wireless frames to which of the following addresses?

Correct Answer:A

START GSEC EXAM