New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GSNA GIAC Systems and Network Auditor Questions and Answers

Questions 4

You work as a Software Developer for XYZ CORP. You create a SQL server database named DATA1 that will manage the payroll system of the company. DATA1 contains two tables named EmployeeData, Department. While EmployeeData records detailed information of the employees, Department stores information about the available departments in the company. EmployeeData consists of columns that include EmpID, EmpName, DtOBrth, DtOJoin, DeptNo, Desig, BasicSal, etc. You want to ensure that each employee ID is unique and is not shared between two or more employees. You also want to ensure that the employees enter only valid department numbers in the DeptNo column. Which of the following actions will you perform to accomplish the task?

Options:

A.

Define triggers in the EmployeeData table.

B.

Add stored procedures by using Transact-SQL queries.

C.

Add constraints to the EmployeeData table.

D.

Define indexes in the EmployeeData table.

E.

Define views in the database.

Buy Now
Questions 5

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Options:

A.

It uses password hash for client authentication.

B.

It uses a public key certificate for server authentication.

C.

It is supported by all manufacturers of wireless LAN hardware and software.

D.

It provides a moderate level of security.

Buy Now
Questions 6

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.

Transference

B.

Mitigation

C.

Acceptance

D.

Avoidance

Buy Now
Questions 7

Andrew works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domain-based network. The network has five Windows 2003 member servers and 150 Windows XP Professional client computers. One of the member servers works as an IIS server. The IIS server is configured to use the IP address 142.100.10.6 for Internet users and the IP address 16.5.7.1 for the local network. Andrew wants the server to allow only Web communication over the Internet. He also wants to enable the local network users to access the shared folders and other resources. How will Andrew configure the IIS server to accomplish this? (Choose three)

Options:

A.

Enable the IP packet filter.

B.

Permit all the ports on the network adapter that uses the IP address 142.100.10.6.

C.

Permit only port 25 on the network adapter that uses the IP address 142.100.10.6.

D.

Permit all the ports on the network adapter that uses the IP address 16.5.7.1.

E.

Permit only port 80 on the network adapter that uses the IP address 142.100.10.6.

Buy Now
Questions 8

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:

A.

Protocol

B.

ActiveX control

C.

Cookie

D.

Keyword

Buy Now
Questions 9

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

Options:

A.

httprint

B.

ServerMask

C.

Whisker

D.

WinSSLMiM

Buy Now
Questions 10

In addition to denying and granting access, what other services does a firewall support?

Options:

A.

Network Access Translation (NAT)

B.

Secondary connections

C.

Control Internet access based on keyword restriction

D.

Data caching

Buy Now
Questions 11

Mark implements a Cisco unified wireless network for Tech Perfect Inc. Which functional area of the Cisco unified wireless network architecture includes intrusion detection and prevention?

Options:

A.

Network services

B.

Wireless clients

C.

Network unification

D.

Wireless access points

Buy Now
Questions 12

Which of the following controls define the direction and behavior required for technology to function properly?

Options:

A.

Detailed IS controls

B.

General controls

C.

Application controls

D.

Pervasive IS controls

Buy Now
Questions 13

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Safeguards

B.

Detective controls

C.

Corrective controls

D.

Preventive controls

Buy Now
Questions 14

Which of the following are the goals of risk management? (Choose three)

Options:

A.

Identifying the risk

B.

Assessing the impact of potential threats

C.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

D.

Identifying the accused

Buy Now
Questions 15

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:

A.

Residual risk

B.

Inherent risk

C.

Secondary risk

D.

Detection risk

Buy Now
Questions 16

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you take to accomplish the task?

Options:

A.

Implement the open system authentication for the wireless network.

B.

Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

C.

Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

D.

Implement the IEEE 802.1X authentication for the wireless network.

E.

Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

Buy Now
Questions 17

Which of the following allows the use of multiple virtual servers using different DNS names resolved by the same IP address?

Options:

A.

HTTP 1.1

B.

JAVA

C.

HTML

D.

VPN

Buy Now
Questions 18

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server. You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

Options:

A.

Disable anonymous authentication.

B.

Stop the FTP service on the server.

C.

Disable the network adapter on the server.

D.

Enable anonymous authentication.

Buy Now
Questions 19

Which of the following encryption encoding techniques is used in the basic authentication method?

Options:

A.

HMAC_MD5

B.

Md5

C.

DES (ECB mode)

D.

Base64

Buy Now
Questions 20

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

e2fsck

B.

dump

C.

dumpe2fs

D.

e2label

Buy Now
Questions 21

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

swapon

B.

tune2fs

C.

swapoff

D.

sync

Buy Now
Questions 22

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Buy Now
Questions 23

You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?

Options:

A.

The computers and their applications should be used for organizational related activities only.

B.

Computers may not be left unattended with a user account still logged on.

C.

Applications other than those supplied or approved by the company can be installed on any computer.

D.

The installed e-mail application can only be used as the authorized e-mail service.

Buy Now
Questions 24

Which of the following is a method of the HttpSession interface and is used to retrieve the time when the session was created?

Options:

A.

getCreationTime()

B.

getSessionCreationTime()

C.

getSessionTime()

D.

getTime()

Buy Now
Questions 25

Which of the following tools is used for port scanning?

Options:

A.

L0phtcrack

B.

NSLOOKUP

C.

NETSH

D.

Nmap

Buy Now
Questions 26

You are the Security Administrator for an Internet Service Provider. From time to time your company gets subpoenas from attorneys and law enforcement for records of customers' access to the internet. What policies must you have in place to be prepared for such requests?

Options:

A.

Group access policies

B.

Backup policies

C.

User access policies

D.

Storage and retention policies

Buy Now
Questions 27

Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the company. In the Web site, she uses multiple and overlapping style definitions to control the appearance of HTML elements. What is this technique known as?

Options:

A.

Style sheet

B.

Cascading Style Sheet

C.

Overlapping Style Sheet

D.

Core sheet

Buy Now
Questions 28

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:

A.

IEEE 802.1X using EAP-TLS

B.

IEEE 802.1X using PEAP-MS-CHAP

C.

Pre-shared key

D.

Open system

Buy Now
Questions 29

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a dat a.txt file, 200MB in size, into two files in which the size of the first file named data.txt.aa should be 150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command: split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt Which of the following commands can John use to join the splitted files into a new data.txt file?

Options:

A.

vi data.txt.* > data.txt

B.

less data.txt.* > data.txt

C.

vi data.txt.*

D.

cat data.txt.* > data.txt

Buy Now
Questions 30

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up a honey pot

B.

Vulnerability scanning

C.

Setting up IDS

D.

Port scanning

Buy Now
Questions 31

Which of the following types of authentication tokens forms a logical connection to the client computer but does not require a physical connection?

Options:

A.

Virtual token

B.

Connected token

C.

Disconnected token

D.

Contactless token

Buy Now
Questions 32

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server: Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Options:

A.

PsPasswd

B.

WinSSLMiM

C.

PsFile

D.

UserInfo

Buy Now
Questions 33

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? (Choose two)

Options:

A.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

B.

Attacker can use the Ping Flood DoS attack if WZC is used.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 34

Mark works as a Database Administrator for MarLinc Inc. How will he execute a SQL command from the SQL buffer?

Options:

A.

Enter an asterisk (*)

B.

Enter a semicolon (;)

C.

Press [ESC] twice

D.

Press [RETURN] twice

E.

Enter a slash (/)

Buy Now
Questions 35

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?

Options:

A.

It incorporates real-time reporting and real-time alerting.

B.

It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches & routers etc.), syslog servers etc.

C.

It is a software package for the statistical analysis and reporting of log files.

D.

It comes only as a software package for user deployment.

Buy Now
Questions 36

An attacker wants to connect directly to an unsecured station to circumvent the AP security or to attack the station. Which of the following tools can be used to accomplish the task?

Options:

A.

Wireless card

B.

MacChanger

C.

SirMACsAlot

D.

USB adapter

Buy Now
Questions 37

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

Options:

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

Buy Now
Questions 38

What is the purpose of Cellpadding attribute of

tag?

Options:

A.

Cellpadding is used to set the width of cell border and its content.

B.

Cellpadding is used to set the width of a table.

C.

Cellpadding is used to set the space between the cell border and its content.

D.

Cellpadding is used to set the space between two cells in a table.

Buy Now
Questions 39

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has a data.txt file in which each column is separated by the TAB character. Now, he wants to use this file as input for a data mining software he has created. The problem preventing him from accomplishing his task is that with his data mining software, he has used TAB as a delimiter to distinguish between columns. Hence, he is unable to use this file as input for the software. However, if he somehow replaces the TAB characters of the file with SPACE characters, he can use this file as an input file for his data mining software. Which of the following commands will John use to replace the TAB characters of the file with SPACE characters?

Options:

A.

expand -t 1 data.txt > data.txt

B.

cat data.txt

C.

chmod 755 data.txt

D.

touch data.txt

Buy Now
Questions 40

Which of the following aaa accounting commands should be used to enable logging of both the start and stop records for user terminal sessions on the router?

Options:

A.

aaa accounting auth proxy start-stop tacacs+

B.

aaa accounting system none tacacs+

C.

aaa accounting connection start-stop tacacs+

D.

aaa accounting exec start-stop tacacs+

Buy Now
Questions 41

Which of the following are the countermeasures against WEP cracking?

Options:

A.

Using the longest key supported by hardware.

B.

Changing keys often.

C.

Using a non-obvious key.

D.

Using a 16 bit SSID.

Buy Now
Questions 42

Which of the following are the drawbacks of the NTLM Web authentication scheme?

Options:

A.

The password is sent in hashed format to the Web server.

B.

It works only with Microsoft Internet Explorer.

C.

The password is sent in clear text format to the Web server.

D.

It can be brute forced easily.

Buy Now
Questions 43

Which of the following is a prevention-driven activity to reduce errors in the project and to help the project meet its requirements?

Options:

A.

Audit sampling

B.

Asset management

C.

Access control

D.

Quality assurance

Buy Now
Questions 44

You work as a Network Administrator for XYZ CORP. The company's Windows 2000 network is configured with Internet Security and Acceleration (ISA) Server 2000. ISA Server is configured as follows: The server uses the default site and content rule and default IP packet filters. Packet filtering is enabled. The server has two protocol rules:

Users in the network complain that they are unable to access secure Web sites. However, they are able to connect to Web sites in which secure transmission is not required. What is the most likely cause?

Options:

A.

A protocol rule that allows the use of HTTP has not been created.

B.

An IP packet filter that allows the use of network traffic on port 80 has not been created.

C.

An IP packet filter that allows the use of network traffic on port 443 has not been created.

D.

A protocol rule that allows the use of HTTPS has not been created.

Buy Now
Questions 45

John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company. Which of the following can be the purpose of this analysis? (Choose three)

Options:

A.

To ensure absolute safety during the audit

B.

To analyze exposure to risk in order to support better decision-making and proper management of those risks

C.

To try to quantify the possible impact or loss of a threat

D.

To assist the auditor in identifying the risks and threats

Buy Now
Questions 46

Which of the following commands can you use to search a string 'pwd' in all text files without opening them? (Choose two)

Options:

A.

vi

B.

grep

C.

sed

D.

locate

Buy Now
Questions 47

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to track the system for user logins. To accomplish the task, you need to analyze the log configuration files. Which of the following Unix log configuration files can you use to accomplish the task?

Options:

A.

/var/log/messages

B.

/var/log/secure

C.

/var/spool/mail

D.

/var/log/maillog

Buy Now
Questions 48

Which of the following records is the first entry in a DNS database file?

Options:

A.

CNAME

B.

SOA

C.

SRV

D.

MX

Buy Now
Questions 49

Which of the following statements about data integrity of a container are true? (Choose two)

Options:

A.

It ensures that a hacker cannot alter the contents of an HTTP message while it is in transit from a container to a client.

B.

Data integrity ensures that information is made available to users who are authorized to access it.

C.

Data integrity ensures that information has not been modified by a third party while it is in transit.

D.

It ensures that an eavesdropper cannot read an HTTP message being sent from a client to a container.

Buy Now
Questions 50

You want to change the number of characters displaying on the screen while reading a txt file. However, you do not want to change the format of the txt file. Which of the following commands can be used to view (but not modify) the contents of the text file on the terminal screen at a time?

Options:

A.

cat

B.

tail

C.

less

D.

more

Buy Now
Questions 51

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of specific types of packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It is used to store information about confidential data.

Buy Now
Questions 52

You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

Options:

A.

Open up all the unused management ports.

B.

Set similar passwords for each management port.

C.

Set long session timeouts.

D.

Ignore usage of the default account settings.

Buy Now
Questions 53

Samantha works as a Web Developer for XYZ CORP. She develops a Web application using Visual InterDev. She wants to group a series of HTML elements together so that an action can be performed collectively on them. Which of the following tags will Samantha use to accomplish this?

Options:

A.

DIV

B.

GROUP

C.

BODY

D.

SPAN

Buy Now
Questions 54

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.5

D.

IEEE 802.11b

Buy Now
Questions 55

Which of the following is a type of web site monitoring that is done using web browser emulation or scripted real web browsers?

Options:

A.

Route analytics

B.

Passive monitoring

C.

Network tomography

D.

Synthetic monitoring

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Dec 22, 2024
Questions: 368

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99