Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

GSNA Sample Questions Answers

Questions 4

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

Options:

A.

None, adding a wireless access point is a common task and not a security risk.

B.

It is likely to increase network traffic and slow down network performance.

C.

This circumvents network intrusion detection.

D.

An unauthorized WAP is one way for hackers to get into a network.

Buy Now
Questions 5

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Safeguards

B.

Detective controls

C.

Corrective controls

D.

Preventive controls

Buy Now
Questions 6

You are responsible for a large network that has its own DNS servers. You periodically check the log to see if there are any problems. Which of the following are likely errors you might encounter in the log? (Choose three)

Options:

A.

The DNS server could not create FTP socket for address [IP address of server]

B.

The DNS server could not create an SMTP socket

C.

Active Directory Errors

D.

The DNS server could not create a Transmission Control Protocol (TCP) socket

E.

The DNS server could not initialize the Remote Procedure Call (RPC) service

Buy Now
Questions 7

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform tests on computer files and databases?

Options:

A.

Parallel Simulation

B.

Generalized Audit Software (GAS)

C.

Test Data

D.

Custom Audit Software (CAS)

Buy Now
Questions 8

You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Options:

A.

A network-based application layer firewall

B.

Host-based application firewall

C.

An application firewall

D.

Stateful firewall

Buy Now
Questions 9

Mark works as a Web Designer for XYZ CORP. The company has a Windows-based network. Mark creates an HTML document that gives the following error on execution: "These hypertext system features are not supported by HTML". Which of the following can be the hypertext system features that are NOT supported by HTML? (Choose three)

Options:

A.

Source tracking

B.

Typed link

C.

Hyperlink

D.

Fat link

Buy Now
Questions 10

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Options:

A.

TIS authentication

B.

Kerberos authentication

C.

Rhosts (rsh-style) authentication

D.

Password-based authentication

Buy Now
Questions 11

You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?

Options:

A.

history ##

B.

history !#

C.

history !!

D.

history !1

Buy Now
Questions 12

Which of the following applications work as mass-emailing worms? (Choose two)

Options:

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Nimda virus

D.

Melissa virus

Buy Now
Questions 13

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets: 10.10.2.103 10.10.0.0/24 Which of the following sets of commands will you use to accomplish the task?

Options:

A.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4 access-class 10 out

B.

access-list 10 permit 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4 access-group 10 in

C.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4

access-class 10 in

D.

access-list 10 permit host 10.10.2.103

access-list 11 permit host 10.10.0.0 255.255.255.0

access-list 12 deny any line vty 0 4

access-group 10, 11, 12 in

Buy Now
Questions 14

Which of the following backup sites takes the longest recovery time?

Options:

A.

Mobile backup site

B.

Warm site

C.

Cold site

D.

Hot site

Buy Now
Questions 15

You work as a Desktop Support Technician for XYZ CORP. The company uses a Windows-based network comprising 50 Windows XP Professional computers. You want to include the Safe Mode with Command Prompt feature into the boot.ini file of a Windows XP Professional computer. Which of the following switches will you use?

Options:

A.

/safeboot:network /sos /bootlog /noguiboot

B.

/safeboot:minimal /sos /bootlog /noguiboot

C.

/safeboot:minimal(alternateshell) /sos /bootlog /noguiboot

D.

/safeboot:dsrepair /sos

Buy Now
Questions 16

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-are-secure network. Which of the following IEEE-based traffic can be sniffed with Kismet?

Options:

A.

802.11g

B.

802.11n

C.

802.11b

D.

802.11a

Buy Now
Questions 17

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WEP

B.

WPA with 802.1X authentication

C.

WPA

D.

WPA with Pre Shared Key

Buy Now
Questions 18

Which of the following is a basic feature of the Unix operating system? (Choose three)

Options:

A.

It is highly portable across hardware.

B.

All files can be individually protected using read, write, and execute permissions for the user, group, and others.

C.

It allows all the modules to be loaded into memory.

D.

A user can execute multiple programs at the same time from a single terminal.

Buy Now
Questions 19

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to see the list of the filesystems mounted automatically at startup by the mount -a command in the /etc/rc startup file. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/named.conf

B.

/etc/groups

C.

/etc/mtab

D.

/etc/fstab

Buy Now
Questions 20

Which of the following statements are true about data aggregation?

Options:

A.

A common aggregation purpose is to get more information about particular groups based on specific variables.

B.

Data aggregation cannot be user-based.

C.

Data aggregation is any process in which information is gathered and expressed in a summary form.

D.

Online analytic processing (OLAP) is a simple type of data aggregation.

Buy Now
Questions 21

What are the different categories of PL/SQL program units?

Options:

A.

Default

B.

Unnamed

C.

Primary

D.

Named

Buy Now
Questions 22

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

Options:

A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Buy Now
Questions 23

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Options:

A.

Dynamic key encryption

B.

Public key certificate for server authentication

C.

Strongest security level

D.

Password hash for client authentication

Buy Now
Questions 24

In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. Which of the following categories of audit standards established by GAAS are related to professional and technical competence, independence, and professional due care?

Options:

A.

Reporting standards

B.

Risk Analysis standards

C.

General standards

D.

Field work standards

Buy Now
Questions 25

You want to monitor the network infrastructure of a software-based company. The network infrastructure of the company consists of the following: Windows TCP/IP services Web and mail servers URLs Applications (MS Exchange, SQL etc.) Which of the following network monitoring solutions can you use to accomplish the task?

Options:

A.

Axence nVision

B.

CommandCenter NOC

C.

Netmon

D.

Cymphonix Network Composer

Buy Now
Questions 26

Which of the following statements about system hardening are true? (Choose two)

Options:

A.

It is used for securing the computer hardware.

B.

It can be achieved by installing service packs and security updates on a regular basis.

C.

It can be achieved by locking the computer room.

D.

It is used for securing an operating system.

Buy Now
Questions 27

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Options:

A.

Session Hijacking

B.

Bluesnarfing

C.

Privilege Escalation

D.

PDA Hijacking

Buy Now
Questions 28

Mark implements a Cisco unified wireless network for Tech Perfect Inc. Which functional area of the Cisco unified wireless network architecture includes intrusion detection and prevention?

Options:

A.

Network services

B.

Wireless clients

C.

Network unification

D.

Wireless access points

Buy Now
Questions 29

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below: This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME. Which of the following viruses has the symptoms as the one described above?

Options:

A.

I Love You

B.

Nimda

C.

Chernobyl

D.

Melissa

Buy Now
Questions 30

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to impose some special access restrictions on users. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/var/run/utmp

B.

/etc/terminfo

C.

/etc/usertty

D.

/etc/termcap

Buy Now
Questions 31

Which of the following are attributes of the

tag? (Choose three)

Options:

A.

BORDER

B.

ALIGN

C.

TD

D.

WIDTH

Buy Now
tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the
tag is used to set the width of the table border. Answer: C is incorrect.
is not an attribute of the tag. It is a tag used to specify cells in a table.

Questions 32

Which of the following key combinations in the vi editor is used to copy the current line?

Options:

A.

dk

B.

yy

C.

d$

D.

dl

Buy Now
Questions 33

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer? (Choose two)

Options:

A.

SSID of the WLAN

B.

WEP key

C.

IP address of the router

D.

MAC address of the router

Buy Now
Questions 34

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Web ripping

B.

Steganography

C.

Email spoofing

D.

Social engineering

Buy Now
Questions 35

What will be the output of the following command? echo $(date %M) > date.txt

Options:

A.

The current time (Month) will be written in the date.txt file.

B.

It will create a variable $(date %M).

C.

It will print a string "date %M".

D.

The current time (Minutes) will be written in the date.txt file.

Buy Now
Questions 36

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the user login features on the systems with the shadow passwords. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/logrotate.conf

B.

/etc/login.defs

C.

/etc/magic

D.

/etc/filesystems

Buy Now
Questions 37

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes: a.War driving b.Detecting unauthorized access pointsc.Detecting causes of interference on a WLAN d.WEP ICV error trackinge.Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.

Options:

A.

THC-Scan

B.

NetStumbler

C.

Absinthe

D.

Kismet

Buy Now
Questions 38

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

Options:

A.

Setting up of monitoring on ISA Server

B.

Defining how ISA Server would cache Web contents

C.

Defining ISA Server network configuration

D.

Configuration of VPN access

Buy Now
Questions 39

Which of the following protocols is the mandatory part of the WPA2 standard in the wireless networking?

Options:

A.

CCMP

B.

ARP

C.

WEP

D.

TKIP

Buy Now
Questions 40

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Buy Now
Questions 41

Which of the following statements are true about a hot site?

Options:

A.

It is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

B.

It is the most inexpensive backup site.

C.

It can be used within an hour for data recovery.

D.

It is cheaper than a cold site but more expensive than a worm site.

Buy Now
Questions 42

Which of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Perform Quantitative Risk Analysis

B.

Monitor and Control Risks

C.

Perform Qualitative Risk Analysis

D.

Identify Risks

Buy Now
Questions 43

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/proc/meminfo

B.

/etc/sysconfig/amd

C.

/proc/modules

D.

/etc/sudoers

Buy Now
Questions 44

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared Key authentication?

Options:

A.

Install PEAP-MS-CHAP v2

B.

Enable WEP

C.

Install Service Pack 1

D.

Install EAP-TLS.

Buy Now
Questions 45

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mke2fs

B.

mkswap

C.

mkfs

D.

hdparm

Buy Now
Questions 46

Which of the following is the best way to authenticate users on the intranet?

Options:

A.

By using Forms authentication.

B.

By using Basic authentication.

C.

By using clear text.

D.

By using NT authentication.

Buy Now
Questions 47

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Options:

A.

Gathering private and public IP addresses

B.

Collecting employees information

C.

Performing Neotracerouting

D.

Banner grabbing

Buy Now
Questions 48

Which of the following processes are involved under the COBIT framework?

Options:

A.

Managing the IT workforce.

B.

Correcting all risk issues.

C.

Conducting IT risk assessments.

D.

Developing a strategic plan.

Buy Now
Questions 49

You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You want to take a snapshot of the router running configuration and archive running configuration of the router to persistent storage. Which of the following steps will you take?

Options:

A.

Secure the boot configuration

B.

Restore an archived primary bootset

C.

Verify the security of the bootset

D.

Enable the image resilience

Buy Now
Questions 50

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Cain

B.

PsPasswd

C.

Kismet

D.

AirSnort

Buy Now
Questions 51

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Options:

A.

It uses password hash for client authentication.

B.

It uses a public key certificate for server authentication.

C.

It is supported by all manufacturers of wireless LAN hardware and software.

D.

It provides a moderate level of security.

Buy Now
Questions 52

Which of the following statements are true about the Enum tool?

Options:

A.

It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information, etc.

B.

It is capable of performing brute force and dictionary attacks on individual accounts of Windows NT/2000.

C.

One of the countermeasures against the Enum tool is to disable TCP port 139/445.

D.

It is a console-based Win32 information enumeration utility.

Buy Now
Questions 53

You are responsible for a number of Windows Server 2003 DNS servers on a large corporate network. You have decided to audit the DNS server logs. Which of the following are likely errors you could encounter in the log? (Choose two)

Options:

A.

The DNS server could not create FTP socket for address [IP address of server].

B.

The DNS server could not open socket for domain name [domain name of server].

C.

The DNS server could not create a Transmission Control Protocol (TCP) socket.

D.

The DNS server could not open socket for address [IP address of server].

Buy Now
Questions 54

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You configure a new Windows Server 2008 server in the network. The new server is not yet linked to Active Directory. You are required to accomplish the following tasks: Add a new group named "Sales". Copy the "Returns" group from the older server to the new one. Rename the "Returns" group to "Revenue". View all group members, including for multiple groups/entire domain. You use Hyena to simplify and centralize all of these tasks. Which of the assigned tasks will you be able to accomplish?

Options:

A.

Copy the "Returns" group to the new server.

B.

Rename the "Returns" group to "Revenue".

C.

Add the new group named "Sales".

D.

View and manage all group members, including for multiple groups/entire domain.

Buy Now
Questions 55

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

Options:

A.

kern.* @192.168.0.1

B.

!*.* @192.168.0.1

C.

!kern.* @192.168.0.1

D.

*.* @192.168.0.1

Buy Now
Questions 56

Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymizer removes all the identifying information from a user's computer while the user surfs the Internet. It ensures the privacy of the user in this manner. After the user anonymizes a Web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Which of the following are limitations of anonymizers?

Options:

A.

ActiveX controls

B.

Plugins

C.

Secure protocols

D.

Java applications

E.

JavaScript

Buy Now
Questions 57

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Buy Now
Questions 58

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Options:

A.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should upgrade his antivirus program.

Buy Now
Questions 59

You work as a Web Deployer for UcTech Inc. You write the element for an application in which you write the sub-element as follows: * Who will have access to the application?

Options:

A.

Only the administrator

B.

No user

C.

All users

D.

It depends on the application.

Buy Now
Questions 60

You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. The company needs to provide secure network access. You have configured a firewall to prevent certain ports and applications from forwarding the packets to the company's intranet. What does a firewall check to prevent these ports and applications from forwarding the packets to the intranet?

Options:

A.

The network layer headers and the session layer port numbers

B.

The application layer port numbers and the transport layer headers

C.

The transport layer port numbers and the application layer headers

D.

The presentation layer headers and the session layer port numbers

Buy Now
Questions 61

Which of the following responsibilities does not come under the audit process?

Options:

A.

Reporting all facts and circumstances of the irregular and illegal acts.

B.

Planning the IT audit engagement based on the assessed level of risk.

C.

Reviewing the results of the audit procedures.

D.

Applying security policies.

Buy Now
Questions 62

You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?

Options:

A.

The computers and their applications should be used for organizational related activities only.

B.

Computers may not be left unattended with a user account still logged on.

C.

Applications other than those supplied or approved by the company can be installed on any computer.

D.

The installed e-mail application can only be used as the authorized e-mail service.

Buy Now
Questions 63

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company. Which of the following can be a cause for making the network vulnerable? (Choose two)

Options:

A.

Use of well-known code

B.

Use of uncommon code

C.

Use of uncommon software

D.

Use of more physical connections

Buy Now
Questions 64

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

Buy Now
Questions 65

Which of the following is a technique for creating Internet maps? (Choose two)

Options:

A.

AS PATH Inference

B.

Object Relational Mapping

C.

Active Probing

D.

Network Quota

Buy Now
Questions 66

You work as a Software Developer for UcTech Inc. You are building a Web site that will contain study materials on the Java language. The company wants that members can access all the pages, but non-members have only limited access to the Web site pages. Which of the following security mechanisms will you use to accomplish the task?

Options:

A.

Data integrity

B.

Authentication

C.

Confidentiality

D.

Authorization

Buy Now
Questions 67

In which of the following attack techniques does an attacker try to intercept the successful handshake and then use a dictionary attack to retrieve the shared key?

Options:

A.

Shared key guessing

B.

Brute force attack

C.

Dictionary attack

D.

PSK cracking

Buy Now
Questions 68

You work as a Web Developer for XYZ CORP. The company has a Windows-based network. You have been assigned the task to secure the website of the company. To accomplish the task, you want to use a website monitoring service. What are the tasks performed by a website monitoring service?

Options:

A.

It checks the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network.

B.

It checks SSL Certificate Expiry.

C.

It checks HTTP pages.

D.

It checks Domain Name Expiry.

Buy Now
Questions 69

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to track the system for user logins. To accomplish the task, you need to analyze the log configuration files. Which of the following Unix log configuration files can you use to accomplish the task?

Options:

A.

/var/log/messages

B.

/var/log/secure

C.

/var/spool/mail

D.

/var/log/maillog

Buy Now
Questions 70

John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company. Which of the following can be the purpose of this analysis? (Choose three)

Options:

A.

To ensure absolute safety during the audit

B.

To analyze exposure to risk in order to support better decision-making and proper management of those risks

C.

To try to quantify the possible impact or loss of a threat

D.

To assist the auditor in identifying the risks and threats

Buy Now
Questions 71

Which of the following statements are true about security risks? (Choose three)

Options:

A.

They can be removed completely by taking proper actions.

B.

They are considered an indicator of threats coupled with vulnerability.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They can be analyzed and measured by the risk analysis process.

Buy Now
Questions 72

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You want to configure the ACL with a Cisco router. Which of the following router prompts can you use to accomplish the task?

Options:

A.

router(config-if)#

B.

router(config)#

C.

router(config-ext-nacl)#

D.

router#

Buy Now
Questions 73

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs? (Choose two)

Options:

A.

Using personal firewall software on your Laptop.

B.

Using a protocol analyzer on your Laptop to monitor for risks.

C.

Using portscanner like nmap in your network.

D.

Using an IPSec enabled VPN for remote connectivity.

Buy Now
Questions 74

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Protective controls

B.

Reactive controls

C.

Detective controls

D.

Preventive controls

Buy Now
Questions 75

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Options:

A.

The site should use CAPTCHA after a specific number of failed login attempts.

B.

The site should increase the encryption key length of the password.

C.

The site should restrict the number of login attempts to only three times.

D.

The site should force its users to change their passwords from time to time.

Buy Now
Questions 76

Data mining is a process of sorting through data to identify patterns and establish relationships. Which of the following data mining parameters looks for patterns where one event is connected to another event?

Options:

A.

Sequence or path analysis

B.

Forecasting

C.

Clustering

D.

Association

Buy Now
Questions 77

Which of the following commands can be used to intercept and log the Linux kernel messages?

Options:

A.

syslogd

B.

klogd

C.

sysklogd

D.

syslog-ng

Buy Now
Questions 78

Samantha works as a Web Developer for XYZ CORP. She is designing a Web site for the company. In a Web page, she uses the HTTP-EQUIV attribute to control the page cache. Which of the following HTTP-EQUIV values controls the page cache in the browser folder?

Options:

A.

Window-target

B.

Status-code

C.

Content-type

D.

Pragma

Buy Now
Questions 79

You work as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. You have used the LogMiner feature for auditing purposes. Which of the following files store a copy of the data dictionary? (Choose two)

Options:

A.

Online redo log files

B.

Operating system flat file

C.

Dump file

D.

Control file

Buy Now
Questions 80

Which of the following statements are true about KisMAC?

Options:

A.

It scans for networks passively on supported cards.

B.

It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.

C.

It is a wireless network discovery tool for Mac OS X.

D.

Data generated by KisMAC can also be saved in pcap format. \

Buy Now
Questions 81

Which of the following statements are true about SSIDs?

Options:

A.

Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

B.

SSIDs are case insensitive text strings and have a maximum length of 64 characters.

C.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

D.

SSID is used to identify a wireless network.

Buy Now
Questions 82

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Options:

A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

It provides better security than the Wi-Fi Protected Access protocol.

D.

Automated tools such as AirSnort are available for discovering WEP keys.

Buy Now
Questions 83

Which of the following is required by a Web-based application to connect to a database?

Options:

A.

DSN

B.

DNS

C.

CGI

D.

FQDN

Buy Now
Questions 84

You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchase books using their credit cards. You want to ensure that only the administrator can access the credit card information sent by users. Which security mechanism will you use to accomplish the task?

Options:

A.

Confidentiality

B.

Data integrity

C.

Authentication

D.

Authorization

Buy Now
Questions 85

Mark works as a Database Administrator for MarLinc Inc. How will he execute a SQL command from the SQL buffer?

Options:

A.

Enter an asterisk (*)

B.

Enter a semicolon (;)

C.

Press [ESC] twice

D.

Press [RETURN] twice

E.

Enter a slash (/)

Buy Now
Questions 86

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. A user is unable to access the Internet from Host B. You also verify that Host B is not able to connect to other resources on the network. The IP configuration of Host B is shown below:

Which of the following is the most likely cause of the issue?

Options:

A.

An incorrect subnet mask is configured on Host B.

B.

The IP address of Host B is not from the correct IP address range of the network.

C.

There is an IP address conflict on the network.

D.

An incorrect default gateway is configured on Host B.

Buy Now
Questions 87

You work as a Software Developer for UcTech Inc. You want to create a new session. Which of the following methods can you use to accomplish the task?

Options:

A.

getNewSession(true)

B.

getSession(false)

C.

getSession()

D.

getSession(true)

E.

getNewSession()

Buy Now
Questions 88

Which of the following is used to execute a SQL statement from the SQL buffer?

Options:

A.

Entering an asterisk (*)

B.

Pressing [RETURN] once

C.

Pressing [RETURN] twice

D.

Entering a slash (/)

E.

Pressing [ESC] twice.

Buy Now
Questions 89

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up a honey pot

B.

Vulnerability scanning

C.

Setting up IDS

D.

Port scanning

Buy Now
Questions 90

Which of the following techniques can be used to determine the network ranges of any network?

Options:

A.

Whois query

B.

SQL injection

C.

Snooping

D.

Web ripping

Buy Now
Questions 91

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

Options:

A.

No contractors shall have access to the authorized resources.

B.

No contractors shall be permitted to scan the network.

C.

No contractors shall have access to the unauthorized resources.

D.

No contractors can access FTP unless specifically granted permissions to use it.

Buy Now
Questions 92

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:

A.

A DNS Zone

B.

An Intranet

C.

A stub zone

D.

A demilitarized zone (DMZ)

Buy Now
Questions 93

Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the company. In the Web site, she uses multiple and overlapping style definitions to control the appearance of HTML elements. What is this technique known as?

Options:

A.

Style sheet

B.

Cascading Style Sheet

C.

Overlapping Style Sheet

D.

Core sheet

Buy Now
Questions 94

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

Options:

A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

Buy Now
Questions 95

You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program's output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?

Options:

A.

cat

B.

more

C.

less

D.

tee

Buy Now
Questions 96

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Continuity of Operations Plan

C.

Business continuity plan

D.

Contingency plan

Buy Now
Questions 97

ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager. Which of the following attributes of ACID confirms that the committed data will be saved by the system such that, even in the event of a failure or system restart, the data will be available in its correct state?

Options:

A.

Durability

B.

Atomicity

C.

Isolation

D.

Consistency

Buy Now
Questions 98

The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path. In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?

Options:

A.

Load

B.

MTU

C.

Hop count

D.

Bandwidth

Buy Now
Questions 99

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? (Choose two)

Options:

A.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

B.

Attacker can use the Ping Flood DoS attack if WZC is used.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 100

The following output is generated by running the show ip route command: RouterA#show ip route < - - Output Omitted for brevity - -> Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:

A.

192.168.10.0

B.

172.18.60.1

C.

172.18.50.1

D.

172.18.1.1

Buy Now
Questions 101

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By setting up a DMZ.

B.

You cannot, you need an IDS.

C.

By examining your domain controller server logs.

D.

By examining your firewall logs.

Buy Now
Questions 102

Peter works as a Web Developer for XYZ CORP. He is developing a Web site for the company. Peter specifies MARGINHEIGHT="0" and MARGINWIDTH="0" in one of the Web pages. How will this affect the Web page?

Options:

A.

It will create a borderless page structure when viewed in any browser.

B.

It will create a borderless page structure when viewed in Netscape Navigator.

C.

It will delete all the text from the margins.

D.

It will create a borderless page structure when viewed in Internet Explorer.

Buy Now
Questions 103

Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?

Options:

A.

149 and 133

B.

203 and 333

C.

139 and 445

D.

198 and 173

Buy Now
Questions 104

Which of the following NFS mount options specifies whether a program using a file via an NFS connection should stop and wait for the server to come back online, if the host serving the exported file system is unavailable, or if it should report an error?

Options:

A.

intr

B.

hard or soft

C.

nfsvers=2 or nfsvers=3

D.

fsid=num

Buy Now
Questions 105

Sam works as a Network Administrator for XYZ CORP. The computers in the company run Windows Vista operating system, and they are continuously connected to the Internet. This makes the network of the company susceptible to attacks from unauthorized users. Which of the following will Sam choose to protect the network of the company from such attacks?

Options:

A.

Firewall

B.

Windows Defender

C.

Software Explorer

D.

Quarantined items

Buy Now
Questions 106

You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security. Which of the following devices would you use to accomplish the task?

Options:

A.

Proxy server

B.

IDS

C.

Packet filtering firewall

D.

honeypot

Buy Now
Questions 107

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Options:

A.

Path MTU discovery (PMTUD)

B.

AS Route Inference

C.

AS PATH Inference

D.

Firewalking

Buy Now
Questions 108

An attacker wants to connect directly to an unsecured station to circumvent the AP security or to attack the station. Which of the following tools can be used to accomplish the task?

Options:

A.

Wireless card

B.

MacChanger

C.

SirMACsAlot

D.

USB adapter

Buy Now
Questions 109

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

Options:

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

Buy Now
Questions 110

Which of the following types of authentication tokens forms a logical connection to the client computer but does not require a physical connection?

Options:

A.

Virtual token

B.

Connected token

C.

Disconnected token

D.

Contactless token

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Sep 15, 2025
Questions: 368
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now GSNA