Question 37

Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?

Correct Answer:D

Question 38

Which of the following statements would describe the term "incident" when used in the branch of security known as Incident Handling?

Correct Answer:D

Question 39

The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?

Correct Answer:D

Question 40

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Correct Answer:A

Question 41

A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it's in use. What feature of HIPS is being described in this scenario?

Correct Answer:B

Question 42

In PKI, when someone wants to verify that the certificate is valid, what do they use to decrypt the signature?

Correct Answer:D

START GSEC EXAM