Certbus > GIAC > GIAC Information Security > GNSA > GNSA Online Practice Questions and Answers

GNSA Online Practice Questions and Answers

Questions 4

DRAG DROP

John works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating system. He installs an application on his computer. The application is not running properly. Therefore, he wants to

disable the application.

What steps will he take to accomplish the task?

Select and Place:

Browse 412 Q&As
Questions 5

You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file.

Which of the following commands will you use to accomplish the task?

A. wc -c file1.txt >>error.txt

B. wc -c file1.txt 1>error.txt

C. wc -c file1.txt 2>error.txt

D. wc -c file1.txt >error.txt

Browse 412 Q&As
Questions 6

Which of the following is a technique for creating Internet maps? (Choose two)

A. AS PATH Inference

B. Object Relational Mapping

C. Active Probing

D. Network Quota

Browse 412 Q&As
Questions 7

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server. You want to secure the server so that only authorized users can access it.

What will you do to accomplish this?

A. Disable anonymous authentication.

B. Stop the FTP service on the server.

C. Disable the network adapter on the server.

D. Enable anonymous authentication.

Browse 412 Q&As
Questions 8

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. He wants to use frames in the Web site.

Which of the following is an HTML tag used to create frames?

A.

B.

C.

D.

Browse 412 Q&As
Questions 9

Which of the following types of firewall functions at the Session layer of OSI model?

A. Packet filtering firewall

B. Circuit-level firewall

C. Switch-level firewall

D. Application-level firewall

Browse 412 Q&As
Questions 10

Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time.

Which of the following options will he choose to accomplish the task?

A. User cannot change password

B. Delete temporary password at next logon

C. User must change password at next logon

D. Password never expires

Browse 412 Q&As
Questions 11

Which of the following commands can you use to search a string 'pwd' in all text files without opening them? (Choose two)

A. vi

B. grep

C. sed

D. locate

Browse 412 Q&As
Questions 12

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN.

Which of the following is the required information that you will need to configure the client computer? (Choose two)

A. SSID of the WLAN

B. WEP key

C. IP address of the router

D. MAC address of the router

Browse 412 Q&As
Questions 13

Which of the following types of firewall ensures that the packets are part of the established session?

A. Stateful inspection firewall

B. Switch-level firewall

C. Circuit-level firewall

D. Application-level firewall

Browse 412 Q&As
Questions 14

You are the Network Admin for a company. You are concerned about users having access to items they should not. Your concern is that they may inadvertently have been granted access to those resources. When conducting a user access and rights review, which of the following is most likely to show you such unintentional granting of user rights?

A. IDS Logs

B. Access Control Lists

C. Server logs

D. Group Membership

Browse 412 Q&As
Questions 15

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

It is Linux-based WLAN WEP cracking tool that recovers encryption keys.

It operates by passively monitoring transmissions.

It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.

Which of the following tools is John using to crack the wireless encryption keys?

A. Cain

B. PsPasswd

C. Kismet

D. AirSnort

Browse 412 Q&As
Questions 16

Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?

A. tac

B. tr

C. cat

D. less

Browse 412 Q&As
Questions 17

Which of the following statements about system hardening are true? (Choose two)

A. It is used for securing the computer hardware.

B. It can be achieved by installing service packs and security updates on a regular basis.

C. It can be achieved by locking the computer room.

D. It is used for securing an operating system.

Browse 412 Q&As
Questions 18

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server.

What should be your highest priority then in checking his network?

A. Setting up a honey pot

B. Vulnerability scanning

C. Setting up IDS

D. Port scanning

Browse 412 Q&As
Exam Code: GNSA
Exam Name: GIAC Systems and Network Auditor
Last Update: Apr 30, 2024
Questions: 412 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99