Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GSNA GIAC Systems and Network Auditor Questions and Answers

Questions 4

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Buy Now
Questions 5

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.5

D.

IEEE 802.11b

Buy Now
Questions 6

Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services. Which of the following are the techniques used for network mapping by large organizations? Each correct answer represents a complete solution. Choose three.

Options:

A.

Route analytics

B.

Active Probing

C.

SNMP-based approaches

D.

Packet crafting

Buy Now
Questions 7

Which of the following are the disadvantages of Dual-Homed Host Firewall Architecture?

Options:

A.

It can provide services by proxying them.

B.

It can provide a very low level of control.

C.

User accounts may unexpectedly enable services a user may not consider secure.

D.

It provides services when users log on to the dual-homed host directly.

Buy Now
Questions 8

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

Options:

A.

The laptop will be able to access the wireless network but the security will be compromised.

B.

The WAP will allow the connection with the guest account ' s privileges.

C.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

D.

The laptop will not be able to access the wireless network.

Buy Now
Questions 9

What is the extension of a Cascading Style Sheet?

Options:

A.

.hts

B.

.cs

C.

.js

D.

.css

Buy Now
Questions 10

You want to change the number of characters displaying on the screen while reading a txt file. However, you do not want to change the format of the txt file. Which of the following commands can be used to view (but not modify) the contents of the text file on the terminal screen at a time?

Options:

A.

cat

B.

tail

C.

less

D.

more

Buy Now
Questions 11

You have an online video library. You want to upload a directory of movies. Since this process will take several hours, you want to ensure that the process continues even after the terminal is shut down or session is closed. What will you do to accomplish the task?

Options:

A.

Use the bg command to run the process at the background.

B.

Add the nohup command in front of the process.

C.

Add the nohup command at the end of the process.

D.

Run the process inside a GNU Screen-style screen multiplexer.

Buy Now
Questions 12

Which of the following is Microsoft ' s implementation of the file and application server for the Internet and private intranets?

Options:

A.

Internet Server Service (ISS)

B.

Internet Server (IS)

C.

WWW Server (WWWS)

D.

Internet Information Server (IIS)

Buy Now
Questions 13

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Buy Now
Questions 14

You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. The company needs to provide secure network access. You have configured a firewall to prevent certain ports and applications from forwarding the packets to the company ' s intranet. What does a firewall check to prevent these ports and applications from forwarding the packets to the intranet?

Options:

A.

The network layer headers and the session layer port numbers

B.

The application layer port numbers and the transport layer headers

C.

The transport layer port numbers and the application layer headers

D.

The presentation layer headers and the session layer port numbers

Buy Now
Questions 15

You work as the Project Engineer for XYZ CORP. The company has a Unix-based network. Your office consists of one server, seventy client computers, and one print device. You raise a request for printing a confidential page. After 30 minutes, you find that your print request job is not processed and is at the seventh position in the printer queue. You analyze that it shall take another one hour to print. You decide to remove your job from the printer queue and get your page printed outside the office. Which of the following Unix commands can you use to remove your job from the printer queue?

Options:

A.

tunelp

B.

pr

C.

lprm

D.

gs

Buy Now
Questions 16

You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?

Options:

A.

wc -c file1.txt > > error.txt

B.

wc -c file1.txt 1 > error.txt

C.

wc -c file1.txt 2 > error.txt

D.

wc -c file1.txt > error.txt

Buy Now
Questions 17

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? (Choose two)

Options:

A.

DNS cache poisoning

B.

DDoS attack

C.

IP spoofing attack

D.

MAC spoofing

Buy Now
Questions 18

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn ' t check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Buy Now
Questions 19

Which of the following statements is NOT true about FAT16 file system?

Options:

A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

B.

FAT16 file system supports file-level compression.

C.

FAT16 does not support file-level security.

D.

FAT16 file system supports Linux operating system.

Buy Now
Questions 20

Which of the following types of audit constructs a risk profile for existing and new projects?

Options:

A.

Technological position audit

B.

Technological innovation process audit

C.

Innovative comparison audit

D.

Client/Server, Telecommunications, Intranets, and Extranets audits

Buy Now
Questions 21

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

Options:

A.

Sam Spade

B.

John the Ripper

C.

Cheops-ng

D.

AiroPeek

Buy Now
Questions 22

Data mining is a process of sorting through data to identify patterns and establish relationships. Which of the following data mining parameters looks for patterns where one event is connected to another event?

Options:

A.

Sequence or path analysis

B.

Forecasting

C.

Clustering

D.

Association

Buy Now
Questions 23

You are tasked with creating an ACL to apply to Fa0/0 based on the following requirements: The ACL must be protocol specific. All traffic from host 10.10.45.2 and subnet 10.10.1.32/27 must be denied access through the router. Telnet and SSH must be denied for ALL hosts except the management host with the IP address of 10.10.0.100. This management host must not only have Telnet and SSH access, but access to any port in the TCP and UDP suite to any destination. HTTP, HTTPS, and DNS requests must be allowed for all hosts on subnets 10.10.2.0/24 and 10.10.3.0/24 to any destination. All remaining traffic must be denied. Cisco IOS applies an implied deny all at the end of an ACL. However, you must provide this configuration manually so that engineers can see hit counts on the deny all traffic when running the show ip access-lists command. Which of the following sets of commands will you choose to complete the configuration on Router A?

Options:

A.

RouterA(config)#access-list 110 deny ip host 10.10.45.2 any

RouterA(config)#access-list 110 deny ip 10.10.1.32 0.0.0.31 any

RouterA(config)#access-list 110 permit tcp host 10.10.0.100 any

RouterA(config)#access-list 110 permit udp host 10.10.0.100 any

RouterA(config)#access-list 110 permit tcp 10.10.2.0 0.0.1.255 any eq 80

RouterA(config)#access-list 110 permit tcp 10.10.2.0 0.0.1.255 any eq 443

Rou

B.

RouterA(config)#access-list 110 deny ip host 10.10.45.2 any

RouterA(config)#access-list 110 deny ip 10.10.1.32 0.0.0.31 any

RouterA(config)#access-list 110 permit ip host 10.10.0.100 any

RouterA(config)#access-list 110 permit tcp 10.10.2.0 0.0.1.255 any eq 80

RouterA(config)#access-list 110 permit tcp 10.10.2.0 0.0.1.255 any eq 443

RouterA(config)#access-list 110 permit udp 10.10.2.0 0.0.1.255 any eq 53

C.

RouterA(config)#access-list 110 deny ip host 10.10.45.2 any

RouterA(config)#access-list 110 deny ip 10.10.1.32 0.0.0.31 any

RouterA(config)#access-list 110 permit tcp host 10.10.0.100 any

RouterA(config)#access-list 110 permit udp host 10.10.0.100 any

RouterA(config)#access-list 110 permit tcp 10.10.2.0 0.0.1.255 any eq 80

RouterA(config)#access-list 110 permit tcp 10.10.2.0 0.0.1.255 any eq 443

Rout

D.

RouterA(config)#access-list 99 deny ip host 10.10.45.2 any

RouterA(config)#access-list 99 deny ip 10.10.1.32 0.0.0.31 any

RouterA(config)#access-list 99 permit tcp host 10.10.0.100 any

RouterA(config)#access-list 99 permit udp host 10.10.0.100 any

RouterA(config)#access-list 99 permit tcp 10.10.2.0 0.0.1.255 any eq 80

RouterA(config)#access-list 99 permit tcp 10.10.2.0 0.0.1.255 any eq 443

RouterA(c

Buy Now
Questions 24

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

NetBIOS NULL session

B.

DNS zone transfer

C.

IIS buffer overflow

D.

SNMP enumeration

Buy Now
Questions 25

Which of the following statements are true about the Enum tool?

Options:

A.

It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information, etc.

B.

It is capable of performing brute force and dictionary attacks on individual accounts of Windows NT/2000.

C.

One of the countermeasures against the Enum tool is to disable TCP port 139/445.

D.

It is a console-based Win32 information enumeration utility.

Buy Now
Questions 26

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

Buy Now
Questions 27

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Safeguards

B.

Detective controls

C.

Corrective controls

D.

Preventive controls

Buy Now
Questions 28

You work as a Web Deployer for UcTech Inc. You write the < security constraint > element for an application in which you write the < auth-constraint > sub-element as follows: < auth- constraint > < role-name > * < /role-name > < /auth-constraint > Who will have access to the application?

Options:

A.

Only the administrator

B.

No user

C.

All users

D.

It depends on the application.

Buy Now
Questions 29

What does CSS stand for?

Options:

A.

Cascading Style Sheet

B.

Coded System Sheet

C.

Cyclic Style Sheet

D.

Cascading Style System

Buy Now
Questions 30

You work as a Network Administrator for Infonet Inc. The company ' s network has an FTP server. You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

Options:

A.

Disable anonymous authentication.

B.

Stop the FTP service on the server.

C.

Disable the network adapter on the server.

D.

Enable anonymous authentication.

Buy Now
Questions 31

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

Options:

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

Buy Now
Questions 32

Web mining allows a user to look for patterns in data through content mining, structure mining, and usage mining. What is the function of structure mining?

Options:

A.

To examine data collected by search engines

B.

To examine data collected by Web spiders

C.

To examine data related to the structure of a particular Web site

D.

To examine data related to a particular user ' s browser

Buy Now
Questions 33

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open? (Choose two)

Options:

A.

25

B.

20

C.

80

D.

110

Buy Now
Questions 34

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires a database that can receive data from various types of operating systems. You want to design a multidimensional database to accomplish the task. Which of the following statements are true about a multidimensional database?

Options:

A.

It is used to optimize Online Analytical Processing (OLAP) applications.

B.

It is used to optimize data warehouse.

C.

It is rarely created using input from existing relational databases.

D.

It allows users to ask questions that are related to summarizing business operations and trends.

Buy Now
Questions 35

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Options:

A.

The site should use CAPTCHA after a specific number of failed login attempts.

B.

The site should increase the encryption key length of the password.

C.

The site should restrict the number of login attempts to only three times.

D.

The site should force its users to change their passwords from time to time.

Buy Now
Questions 36

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He executes the following command in the terminal: echo $USER, $UID Which of the following will be displayed as the correct output of the above command?

Options:

A.

John, 0

B.

root, 0

C.

root, 500

D.

John, 502

Buy Now
Questions 37

Which of the following can be the countermeasures to prevent NetBIOS NULL session enumeration in Windows 2000 operating systems?

Options:

A.

Denying all unauthorized inbound connections to TCP port 53

B.

Disabling SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface

C.

Editing the registry key HKLM\SYSTEM\CurrentControlSet\LSA and adding the value RestrictAnonymous

D.

Disabling TCP port 139/445

Buy Now
Questions 38

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WEP

B.

WPA with 802.1X authentication

C.

WPA

D.

WPA with Pre Shared Key

Buy Now
Questions 39

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

Options:

A.

Misconfigured router

B.

DoS attack

C.

Syn flood

D.

Virus

Buy Now
Questions 40

Anonymizers are the services that help make a user ' s own Web surfing anonymous. An anonymizer removes all the identifying information from a user ' s computer while the user surfs the Internet. It ensures the privacy of the user in this manner. After the user anonymizes a Web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Which of the following are limitations of anonymizers?

Options:

A.

ActiveX controls

B.

Plugins

C.

Secure protocols

D.

Java applications

E.

JavaScript

Buy Now
Questions 41

You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Options:

A.

A network-based application layer firewall

B.

Host-based application firewall

C.

An application firewall

D.

Stateful firewall

Buy Now
Questions 42

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set some terminal characteristics and environment variables. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/sysconfig/routed

B.

/proc/net

C.

/etc/sysconfig/network-scripts/ifcfg-interface

D.

/etc/sysconfig/init

Buy Now
Questions 43

eBox Platform is an open source unified network server (or a Unified Network Platform) for SMEs. In which of the following forms can eBox Platform be used?

Options:

A.

Unified Communications Server

B.

Network Infrastructure Manager

C.

Gateway

D.

Sandbox

Buy Now
Questions 44

Which of the following encryption encoding techniques is used in the basic authentication method?

Options:

A.

HMAC_MD5

B.

Md5

C.

DES (ECB mode)

D.

Base64

Buy Now
Questions 45

You work as a Network Administrator for Tech Perfect Inc. For security issues, the company requires you to harden its routers. You therefore write the following code: Router#config terminal Router(config) #no ip bootp server Router(config) #no ip name-server Router(config) #no ntp server Router(config) #no snmp server Router(config) #no ip http server Router(config) #^Z Router# What services will be disabled by using this configuration fragment?

Options:

A.

BootP service

B.

Finger

C.

CDP

D.

DNS function Explanation:

Buy Now
Questions 46

You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements is unacceptable in the ' acceptable use statement ' portion of the firewall policy?

Options:

A.

The computers and their applications should be used for organizational related activities only.

B.

Computers may not be left unattended with a user account still logged on.

C.

Applications other than those supplied or approved by the company can be installed on any computer.

D.

The installed e-mail application can only be used as the authorized e-mail service.

Buy Now
Questions 47

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While auditing the company ' s network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:

A.

Residual risk

B.

Inherent risk

C.

Secondary risk

D.

Detection risk

Buy Now
Questions 48

Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah wants greater control over the appearance and presentation of Web pages. She wants the ability to precisely specify the display attributes and the appearance of elements on the Web pages. How will she accomplish this?

Options:

A.

Use the Database Design wizard.

B.

Make two templates, one for the index page and the other for all other pages.

C.

Use Cascading Style Sheet (CSS).

D.

Make a template and use it to create each Web page.

Buy Now
Questions 49

Mark implements a Cisco unified wireless network for Tech Perfect Inc. Which functional area of the Cisco unified wireless network architecture includes intrusion detection and prevention?

Options:

A.

Network services

B.

Wireless clients

C.

Network unification

D.

Wireless access points

Buy Now
Questions 50

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

Options:

A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Buy Now
Questions 51

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

Options:

A.

Magic Lantern

B.

KeyGhost Keylogger

C.

Alchemy Remote Executor

D.

SocketShield

Buy Now
Questions 52

You work as a Java Programmer for JavaSkills Inc. You are working with the Linux operating system. Nowadays, when you start your computer, you notice that your OS is taking more time to boot than usual. You discuss this with your Network Administrator. He suggests that you mail him your Linux bootup report. Which of the following commands will you use to create the Linux bootup report?

Options:

A.

touch bootup_report.txt

B.

dmesg > bootup_report.txt

C.

dmesg | wc

D.

man touch

Buy Now
Questions 53

Patricia joins XYZ CORP., as a Web Developer. While reviewing the company ' s Web site, she finds that many words including keywords are misspelled. How will this affect the Web site traffic?

Options:

A.

Leave a bad impression on users.

B.

Search engine relevancy may be altered.

C.

Link exchange with other sites becomes difficult.

D.

The domain name cannot be registered.

Buy Now
Questions 54

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.

Transference

B.

Mitigation

C.

Acceptance

D.

Avoidance

Buy Now
Questions 55

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

Options:

A.

WPA-EAP

B.

WEP

C.

WPA-PSK

D.

WPA2

Buy Now
Questions 56

Which of the following is a type of web site monitoring that is done using web browser emulation or scripted real web browsers?

Options:

A.

Route analytics

B.

Passive monitoring

C.

Network tomography

D.

Synthetic monitoring

Buy Now
Questions 57

Mark works as the Network Administrator for XYZ CORP. The company has a Unix-based network. Mark wants to scan one of the Unix systems to detect security vulnerabilities. To accomplish this, he uses TARA as a system scanner. What can be the reasons that made Mark use TARA?

Options:

A.

It has a very specific function of seeking paths to root.

B.

It is composed mostly of bash scripts

C.

It works on a wide variety of platforms.

D.

It is very modular.

Buy Now
Questions 58

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Scripting attack

D.

Cross-Site Request Forgery

Buy Now
Questions 59

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Options:

A.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

B.

Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

C.

Remove the SNMP agent or disable the SNMP service.

D.

Monitor the programs running on the server to see whether any new process is running on the server or not.

Buy Now
Questions 60

Data access auditing is a surveillance mechanism that watches over access to all sensitive information contained within the database. What are the questions addressed in a perfect data access auditing solution?

Options:

A.

Who accessed the data?

B.

When was the data accessed?

C.

For whom was the data accessed?

D.

What was the SQL query that accessed the data?

Buy Now
Questions 61

You have been assigned a project to develop a Web site for a construction company. You plan to develop a Web site and want to get more control over the appearance and presentation of the Web pages. You also want to increase your ability to precisely specify the position and appearance of the elements on a page and create special effects. You plan to use cascading style sheets (CSS). You want to define styles only for the active page. Which type of style sheet will you use?

Options:

A.

Embedded Style Sheet

B.

Inline Style Sheet

C.

Internal Style Sheet

D.

External Style Sheet

Buy Now
Questions 62

Which of the following commands is most useful for viewing large files?

Options:

A.

cat

B.

less

C.

touch

D.

cp

Buy Now
Questions 63

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/proc/meminfo

B.

/etc/sysconfig/amd

C.

/proc/modules

D.

/etc/sudoers

Buy Now
Questions 64

The employees of CCN Inc. require remote access to the company ' s proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Options:

A.

Dynamic key encryption

B.

Public key certificate for server authentication

C.

Strongest security level

D.

Password hash for client authentication

Buy Now
Questions 65

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. The Manager of the company requires Mark to use tables instead of frames in the Web site. What is the major advantage that a table-structured Web site has over a frame-structured Web site?

Options:

A.

Easy maintenance

B.

Speed

C.

Better navigation

D.

Capability of being bookmarked or added to the Favorites folder

Buy Now
Questions 66

Which of the following functions are performed by methods of the HttpSessionActivationListener interface?

Options:

A.

Notifying an attribute that a session has just migrated from one JVM to another.

B.

Notifying the object when it is unbound from a session.

C.

Notifying the object when it is bound to a session.

D.

Notifying an attribute that a session is about to migrate from one JVM to another.

Buy Now
Questions 67

In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route. What are the benefits of using a static route?

Options:

A.

It is a fault tolerant path.

B.

It reduces load on routers, as no complex routing calculations are required.

C.

It reduces bandwidth usage, as there is no excessive router traffic.

D.

It provides precise control over the routes that packets will take across the network.

Buy Now
Questions 68

You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

GSNA Question 68

You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task. Which of the following actions will you perform to accomplish the task?

Options:

A.

Create a scheduled task to download definition files for Windows Defender every Sunday.

B.

Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

C.

Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

D.

Click the arrow beside the Help button Click the Check for updates option.

Buy Now
Questions 69

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Cain

B.

PsPasswd

C.

Kismet

D.

AirSnort

Buy Now
Questions 70

Which of the following statements is true about residual risks?

Options:

A.

It is the probabilistic risk after implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk before implementing all security measures.

Buy Now
Questions 71

Which of the following are the drawbacks of the NTLM Web authentication scheme?

Options:

A.

The password is sent in hashed format to the Web server.

B.

It works only with Microsoft Internet Explorer.

C.

The password is sent in clear text format to the Web server.

D.

It can be brute forced easily.

Buy Now
Questions 72

Which of the following tools uses Internet Control Message Protocol (ICMP)?

Options:

A.

Port scanner

B.

Brutus

C.

Fragroute

D.

Ping scanner

Buy Now
Questions 73

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. You use DumpSec as an auditing and reporting program for security issues. Which of the following statements is true about DumpSec? (Choose three)

Options:

A.

It obtains the DACLs for the registry.

B.

It dumps user and group information.

C.

It collates the DACLs for the file system.

D.

It kills the running services in the Windows environment.

Buy Now
Questions 74

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Options:

A.

Network anti-spyware software

B.

Network anti-virus software

C.

Protocol analyzers

D.

Site surveys

Buy Now
Questions 75

Which of the following text editing tools can be used to edit text files without having to open them?

Options:

A.

less

B.

sed

C.

vi

D.

more

Buy Now
Questions 76

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of a domain controller, two Windows 2003 member servers, and one hundred client computers. The company employees use laptops with Windows XP Professional. These laptops are equipped with wireless network cards that are used to connect to access points located in the Marketing department of the company. The company employees log on to the domain by using a user name and password combination. The wireless network has been configured with WEP in addition to 802.1x. Mark wants to provide the best level of security for the kind of authentication used by the company. What will Mark do to accomplish the task?

Options:

A.

Use IPSec

B.

Use MD5

C.

Use PEAP

D.

Use EAP-TLS

Buy Now
Questions 77

Which of the following commands can be used to find out where commands are located?

Options:

A.

type

B.

which

C.

env

D.

ls

Buy Now
Questions 78

You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group. Which of the following code snippets imperatively demands that the current user is a member of the local Users group?

Options:

A.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @ " BUILTIN\Users " , true); MyPermission.Demand();

B.

PrincipalPermission MyPermission = new PrincipalPermission(null, @ " BUILTIN\Users " , true); MyPermission.Demand();

C.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @ " Users " , true); MyPermission.Demand();

D.

PrincipalPermission MyPermission = new PrincipalPermission(null, @ " Users " , true); MyPermission.Demand();

Buy Now
Questions 79

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets: 10.10.2.103 10.10.0.0/24 Which of the following sets of commands will you use to accomplish the task?

Options:

A.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4 access-class 10 out

B.

access-list 10 permit 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4 access-group 10 in

C.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4

access-class 10 in

D.

access-list 10 permit host 10.10.2.103

access-list 11 permit host 10.10.0.0 255.255.255.0

access-list 12 deny any line vty 0 4

access-group 10, 11, 12 in

Buy Now
Questions 80

You work as a Network Administrator for Tech Perfect Inc. You need to configure the company firewall so that only Simple Network Management Protocol (SNMP) and Secure HTTP (HTTPS) traffic is allowed into the intranet of the company. No other traffic should be allowed into the intranet. Which of the following rule sets should you use on your firewall to accomplish the task? (Assume left to right equals top to bottom.)

Options:

A.

Output chain: allow port 443, allow 25, deny all

B.

Input chain: deny all, allow port 25, allow 443

C.

Input chain: allow port 25, allow 443, deny all

D.

Output chain: allow port 25, allow 443, deny all

Buy Now
Questions 81

Which of the following commands can be used to intercept and log the Linux kernel messages?

Options:

A.

syslogd

B.

klogd

C.

sysklogd

D.

syslog-ng

Buy Now
Questions 82

You work as a Web Developer for XYZ CORP. The company has a Windows-based network. You have been assigned the task to secure the website of the company. To accomplish the task, you want to use a website monitoring service. What are the tasks performed by a website monitoring service?

Options:

A.

It checks the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network.

B.

It checks SSL Certificate Expiry.

C.

It checks HTTP pages.

D.

It checks Domain Name Expiry.

Buy Now
Questions 83

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to see the username, real name, home directory, encrypted password, and other information about a user. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/passwd

B.

/etc/printcap

C.

/etc/hosts

D.

/etc/inittab

Buy Now
Questions 84

You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?

Options:

A.

history ##

B.

history !#

C.

history !!

D.

history !1

Buy Now
Questions 85

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

Options:

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

Buy Now
Questions 86

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WPA

B.

Implement WEP

C.

Don ' t broadcast SSID

D.

Implement MAC filtering

Buy Now
Questions 87

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company ' s security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company ' s security policy. What will he do to accomplish this? (Choose three)

Options:

A.

Configure the authentication type for the wireless LAN to Shared Key

B.

On each client computer, add the SSID for the wireless LAN as the preferred network

C.

Install a firewall software on each wireless access point

D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points

E.

Configure the authentication type for the wireless LAN to Open system

F.

Broadcast SSID to connect to the access point (AP)

Buy Now
Questions 88

You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program ' s output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?

Options:

A.

cat

B.

more

C.

less

D.

tee

Buy Now
Questions 89

Which of the following tools can be used to perform ICMP tunneling? (Choose two)

Options:

A.

Itunnel

B.

Ptunnel

C.

WinTunnel

D.

Ethereal

Buy Now
Questions 90

Which of the following is used to execute a SQL statement from the SQL buffer?

Options:

A.

Entering an asterisk (*)

B.

Pressing [RETURN] once

C.

Pressing [RETURN] twice

D.

Entering a slash (/)

E.

Pressing [ESC] twice.

Buy Now
Questions 91

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Continuity of Operations Plan

C.

Business continuity plan

D.

Contingency plan

Buy Now
Questions 92

Which of the following is a method of the HttpSession interface and is used to retrieve the time when the session was created?

Options:

A.

getCreationTime()

B.

getSessionCreationTime()

C.

getSessionTime()

D.

getTime()

Buy Now
Questions 93

Which of the following tools is used for port scanning?

Options:

A.

L0phtcrack

B.

NSLOOKUP

C.

NETSH

D.

Nmap

Buy Now
Questions 94

Which of the following techniques can be used to determine the network ranges of any network?

Options:

A.

Whois query

B.

SQL injection

C.

Snooping

D.

Web ripping

Buy Now
Questions 95

Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the company. In the Web site, she uses multiple and overlapping style definitions to control the appearance of HTML elements. What is this technique known as?

Options:

A.

Style sheet

B.

Cascading Style Sheet

C.

Overlapping Style Sheet

D.

Core sheet

Buy Now
Questions 96

A Cisco router can have multiple connections to networks. These connections are known as interfaces for Cisco Routers. For naming each interface, Cisco generally uses the type of interface as part of the name. Which of the following are true about the naming conventions of Cisco Router interfaces?

Options:

A.

An interface connected to a serial connection always starts with an S.

B.

An interface connected to a Token Ring segment always starts with To.

C.

An Ethernet interface that is fast always starts with an F.

D.

An interface connected to an Ethernet segment of the network always starts with an En.

Buy Now
Questions 97

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

Options:

A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

Buy Now
Questions 98

Mike works as a Network Engineer for XYZ CORP. The company has a multi-platform network. Recently, the company faced lots of blended threat issues that lead to several drastic attacks. Mike has been assigned a project to manage the resources and services of the company through both Intranet and Internet to protect the company from these attacks. Mike needs a system that provides auto-discovering and network topology building features to allow him to keep an intuitive view of the IT infrastructure. What will Mike use to meet the requirement of the project?

Options:

A.

eBox

B.

dopplerVUe

C.

David system

D.

EM7

Buy Now
Questions 99

What will happen if you write the following parameters in the web.xml file?

< session-config >

< session-timeout > 0 < /session-timeout >

< /session-config >

Options:

A.

There will be no effect on the session; it will last for its default time.

B.

The session will never expire.

C.

An error will occur during execution.

D.

The session will expire immediately.

Buy Now
Questions 100

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows: C.\whisker.pl -h target_IP_address -- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address = Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22 + 200 OK: HEAD /cgi-bin/printenv John recognizes /cgi-bin/printenv vulnerability ( ' Printenv ' vulnerability) in the We_are_secure server. Which of the following statements about ' Printenv ' vulnerability are true?

Options:

A.

With the help of ' printenv ' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

B.

' Printenv ' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.

The countermeasure to ' printenv ' vulnerability is to remove the CGI script.

D.

This vulnerability helps in a cross site scripting attack.

Buy Now
Questions 101

You work as a programmer for uCertify.Inc. You have a session object named session1 with an attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1. Which of the following will be used to retrieve Attribute1?

Options:

A.

Object obj=binding1.getSession().getAttribute( " Attribute1 " );

B.

Object obj=binding1.getAttribute( " Attribute1 " );

C.

Long MyAttribute=session1.getAttribute( " Attribute1 " );

D.

Object obj=session1.getAttribute( " Attribute1 " );

E.

String str1=session1.getAttribute( " Attribute1 " );

Buy Now
Questions 102

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Options:

A.

Snort

B.

IDS

C.

Firewall

D.

WIPS

Buy Now
Questions 103

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based Enterprise network. The company uses Cisco IOS technologies in the Enterprise network. You have enabled system message logging (syslog) service on all the routers that are currently working in the network. The syslog service provides all the reports, and important error and notification messages. You want to store all the reports and messages. Choose the locations where you can store all of these.

Options:

A.

Auxiliary

B.

Buffer

C.

Syslog server

D.

tty lines

E.

Console

Buy Now
Questions 104

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Incontrovertible

B.

Corroborating

C.

Direct

D.

Circumstantial

Buy Now
Questions 105

Which of the following NFS mount options specifies whether a program using a file via an NFS connection should stop and wait for the server to come back online, if the host serving the exported file system is unavailable, or if it should report an error?

Options:

A.

intr

B.

hard or soft

C.

nfsvers=2 or nfsvers=3

D.

fsid=num

Buy Now
Questions 106

You work as a Network Administrator for Tech-E-book Inc. You are configuring the ISA Server 2006 firewall to provide your company with a secure wireless intranet. You want to accept inbound mail delivery though an SMTP server. What basic rules of ISA Server do you need to configure to accomplish the task.

Options:

A.

Publishing rules

B.

Network rules

C.

Mailbox rules

D.

Access rules

Buy Now
Questions 107

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address 210.213.23.21. This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

Options:

A.

24171811

B.

24619311

C.

24171111

D.

24171311

Buy Now
Questions 108

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Options:

A.

Path MTU discovery (PMTUD)

B.

AS Route Inference

C.

AS PATH Inference

D.

Firewalking

Buy Now
Questions 109

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?

Options:

A.

It incorporates real-time reporting and real-time alerting.

B.

It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches & routers etc.), syslog servers etc.

C.

It is a software package for the statistical analysis and reporting of log files.

D.

It comes only as a software package for user deployment.

Buy Now
Questions 110

You work as a Software Developer for UcTech Inc. You want to create a new session. Which of the following methods can you use to accomplish the task?

Options:

A.

getNewSession(true)

B.

getSession(false)

C.

getSession()

D.

getSession(true)

E.

getNewSession()

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Apr 30, 2026
Questions: 368

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GSNA testing engine

PDF (Q&A)

$43.57  $124.49
buy now GSNA pdf