Try 12 GIAC Security Essentials (GSEC) sample questions and practice-test preview prompts on defense-in-depth, access control, network security, cryptography, vulnerability management, incident response, and practical risk decisions.
GIAC Security Essentials (GSEC) is a security-foundations route for candidates who need practical judgment across defense-in-depth, access control, network security, cryptography, vulnerability management, operations, and incident response.
Use this page to preview the kind of security decisions a GSEC practice route should test. The questions below are original IT Mastery sample questions, not official GIAC exam questions.
Topic: defense-in-depth
A company relies on perimeter firewall rules but has weak endpoint hardening and little monitoring. Which improvement best reflects defense-in-depth?
Best answer: B
Explanation: Defense-in-depth uses multiple preventive, detective, and response controls. A perimeter firewall is useful, but it is not enough by itself.
Topic: least privilege
A service account runs one scheduled backup task but has domain administrator rights. What is the best correction?
Best answer: D
Explanation: Least privilege limits blast radius. Service accounts should have scoped rights, strong credential controls, and monitoring.
Topic: log review
An analyst sees repeated failed VPN logins from many countries against one account. What is the best first action?
Best answer: A
Explanation: Repeated failures can indicate password spraying, credential stuffing, or targeted access attempts. The right response protects the account while preserving evidence.
Topic: cryptography
A developer proposes storing passwords with reversible encryption so support staff can read them back to users. What is the better design?
Best answer: C
Explanation: Passwords should not be recoverable by support staff. Salted hashes and reset workflows reduce exposure if the store is compromised.
Topic: vulnerability management
A scanner reports a critical internet-facing vulnerability on a production system. What should the team do first?
Best answer: B
Explanation: Vulnerability response should be risk-based. Internet exposure, exploitability, asset value, and compensating controls determine urgency.
Topic: secure configuration
An administrator deploys a new server with default credentials, unused services, and no baseline hardening. What should happen before production use?
Best answer: D
Explanation: New systems should be hardened before production. Default credentials and unnecessary services create preventable attack paths.
Topic: segmentation
Payment systems and general office workstations currently share one flat network. What is the most useful control direction?
Best answer: A
Explanation: Segmentation reduces lateral movement and limits exposure. Sensitive systems should have restricted, monitored access paths.
Topic: phishing response
A user reports entering credentials into a suspicious login page. What should happen next?
Best answer: C
Explanation: Phishing response should protect the account, preserve evidence, and assess scope. Blaming the user does not reduce risk.
Topic: incident escalation
A workstation shows suspicious PowerShell execution, outbound connections, and credential-access alerts. What is the best escalation posture?
Best answer: B
Explanation: Multiple suspicious indicators justify incident escalation. Response should follow procedure and preserve evidence for scope analysis.
Topic: backups
Ransomware encrypted a file server and the backup share because it was writable from the same compromised account. What control would have reduced impact?
Best answer: D
Explanation: Backups must be protected from the same compromise path as production data. Restore testing proves recovery is possible.
Topic: authentication
A remote-access portal still accepts password-only login for privileged administrators. What control is most appropriate?
Best answer: A
Explanation: Privileged remote access should require stronger authentication and careful access control. Shared or password-only admin access creates high risk.
Topic: risk prioritization
Two findings compete for remediation: a low-severity internal issue and a critical unauthenticated vulnerability on an internet-facing server. Which should usually be prioritized?
Best answer: C
Explanation: Prioritization should consider severity, exposure, exploitability, and business impact. Internet-facing critical issues usually warrant faster action.
| If you miss… | Drill this next |
|---|---|
| questions about one control solving everything | layered security and compensating controls |
| identity and account questions | least privilege, service accounts, MFA, and monitoring |
| incident questions | triage, containment, evidence, and escalation |
| vulnerability questions | exposure, exploitability, asset criticality, and remediation priority |