Exam Name: | GIAC Security Essentials | ||
Exam Code: | GSEC Dumps | ||
Vendor: | GIAC | Certification: | Security Administration |
Questions: | 385 Q&A's | Shared By: | kyle |
Which of the following is a standard Unix command that would most likely be used to copy raw file system data for later forensic analysis?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following works at the network layer and hides the local area network IP address and topology?
Which of the following processes Is used to prove a user Is who they claim to be based upon something they know, have, are, and/or their physical location?