New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 4 Question 4 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 4
Topic #: 4
[All GSEC Questions]

Which of the following is not an encryption technology?

Show Suggested Answer Hide Answer
Suggested Answer: B

KILL is a command used to terminate a specified process.

Answer options A, C, and D are incorrect. Blowfish, 3DES, and MD5 are encryption technologies used to secure the communication between computers on the network.


Contribute your Thoughts:

0/2000 characters
Eun
4 months ago
I thought MD5 was still used for some things?
upvoted 0 times
...
Rasheeda
4 months ago
Blowfish and 3DES are legit encryption methods.
upvoted 0 times
...
Melissia
4 months ago
Wait, KILL? Is that even a real thing?
upvoted 0 times
...
Stephaine
4 months ago
Totally agree, MD5 is outdated!
upvoted 0 times
...
Tish
5 months ago
MD5 is a hashing algorithm, not encryption.
upvoted 0 times
...
Malcolm
5 months ago
I’m a bit confused; I thought all of these were related to encryption somehow, but I guess KILL stands out as the odd one.
upvoted 0 times
...
Johnetta
5 months ago
I feel like I've seen a question like this before, and I think MD5 was mentioned as not being an encryption technology.
upvoted 0 times
...
Miss
5 months ago
I think Blowfish and 3DES are definitely encryption technologies, but I'm not sure about MD5. Wasn't it more of a hashing algorithm?
upvoted 0 times
...
Ryan
5 months ago
I remember studying KILL in class, but I can't recall if it was an encryption method or something else entirely.
upvoted 0 times
...
Danilo
5 months ago
This looks like a tricky one. I'll need to carefully review the trace file details to determine where the issue is occurring.
upvoted 0 times
...
Lilli
5 months ago
Hmm, I'm not sure about that. Querying for existing records in the database might be a good option too, as it would give us real-world data to work with.
upvoted 0 times
...
Oretha
5 months ago
I've got a good feeling about this. I think options A and B are the way to go - set the server properties and enable the service. The client-side stuff seems more like a distraction.
upvoted 0 times
...
Naomi
5 months ago
Okay, I think I've got a strategy for this. I'll analyze the role and duties of each party mentioned to figure out who could initiate liable action.
upvoted 0 times
...
Emerson
5 months ago
Okay, I think I know the right approach here. Creating a Managed Instance Group with health checks sounds like the best way to automate the instance recreation and ensure the service is always available. I'll select that option.
upvoted 0 times
...

Save Cancel