Certbus > GIAC > GIAC Information Security > GSNA > GSNA Online Practice Questions and Answers

GSNA Online Practice Questions and Answers

Questions 4

DRAG DROP

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Select and place the authentication method you are required to configure to implement the security policy of the company.

Select and Place:

Browse 413 Q&As
Questions 5

DRAG DROP

Drag and drop the corresponding prompt that is displayed in the command-line interface of a Cisco switch IOS for different access modes.

Select and Place:

Browse 413 Q&As
Questions 6

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

A. Magic Lantern

B. KeyGhost Keylogger

C. Alchemy Remote Executor

D. SocketShield

Browse 413 Q&As
Questions 7

Which of the following statements about a perimeter network are true? (Choose three)

A. It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall.

B. It has a connection to a private network through an external firewall and a connection to an internal network through an interior firewall.

C. It is also known as a demilitarized zone or DMZ.

D. It prevents access to the internal corporate network for outside users.

Browse 413 Q&As
Questions 8

Which of the following are the goals of risk management? (Choose three)

A. Identifying the risk

B. Assessing the impact of potential threats

C. Finding an economic balance between the impact of the risk and the cost of the countermeasure

D. Identifying the accused

Browse 413 Q&As
Questions 9

You work as a Software Developer for UcTech Inc. You want to encode a URL, so that it can be used with the sendRedirect() method to send the response to the client. In order to accomplish this, you have to use a method of the HttpServletResponse interface.

Which of the following methods will you use?

A. encodeResponseURL()

B. encodeRedirectURL()

C. encodeURL()

D. encodeURLResponse()

Browse 413 Q&As
Questions 10

You work as the Network Administrator for XYZ CORP. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see first five lines of the file /etc/passwd.

Which of the following commands should you use to accomplish the task?

A. head -n 5 /etc/passwd

B. head 5 -n /etc/passwd

C. tail -n 5 /etc/passwd

D. head /etc/passwd

Browse 413 Q&As
Questions 11

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

A. Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B. Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C. Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D. Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Browse 413 Q&As
Questions 12

You work as a Network Administrator for Tech-E-book Inc. You are configuring the ISA Server 2006 firewall to provide your company with a secure wireless intranet. You want to accept inbound mail delivery though an SMTP server.

What basic rules of ISA Server do you need to configure to accomplish the task.

A. Publishing rules

B. Network rules

C. Mailbox rules

D. Access rules

Browse 413 Q&As
Questions 13

You want to append a tar file if the on-disk version of the tar file has a modification date more recent than its copy in the tar archive.

Which of the following commands will you use to accomplish the task?

A. tar -u

B. tar -t

C. tar -c

D. tar 瓁

Browse 413 Q&As
Questions 14

Which of the following statements are true about a data mart? Each correct answer represents a complete solution.

A. Most writers believe that the design of a data mart tends to start from an analysis of the data already existing.

B. Users of a data mart can expect to have data presented in terms that are familiar to them.

C. A data mart is a repository of data gathered from operational data.

D. The emphasis of a data mart is on meeting the specific demands of a particular group of knowledge users.

Browse 413 Q&As
Questions 15

Which of the following key combinations in the vi editor is used to copy the current line?

A. dk

B. yy

C. d$

D. dl

Browse 413 Q&As
Questions 16

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

A. TIS authentication

B. Kerberos authentication

C. Rhosts (rsh-style) authentication

D. Password-based authentication

Browse 413 Q&As
Questions 17

Mark works as a Web Designer for XYZ CORP. The company has a Windows-based network. Mark creates an HTML document that gives the following error on execution: "These hypertext system features are not supported by HTML".

Which of the following can be the hypertext system features that are NOT supported by HTML? (Choose three)

A. Source tracking

B. Typed link

C. Hyperlink

D. Fat link

Browse 413 Q&As
Questions 18

Mark works as the Network Administrator for XYZ CORP. The company has a Unix-based network. Mark wants to scan one of the Unix systems to detect security vulnerabilities. To accomplish this, he uses TARA as a system scanner.

What can be the reasons that made Mark use TARA?

A. It has a very specific function of seeking paths to root.

B. It is composed mostly of bash scripts

C. It works on a wide variety of platforms.

D. It is very modular.

Browse 413 Q&As
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Apr 27, 2024
Questions: 413 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99