Exam Details

  • Exam Code
    :GSNA
  • Exam Name
    :GIAC Systems and Network Auditor
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :413 Q&As
  • Last Updated
    :Apr 27, 2024

GIAC GIAC Information Security GSNA Questions & Answers

  • Question 1:

    Which of the following commands is most useful for viewing large files?

    A. cat

    B. less

    C. touch

    D. cp

  • Question 2:

    Which of the following is an attempt to give false information or to deny that a real event or transaction should have occurred?

    A. A DDoS attack

    B. A repudiation attack

    C. A reply attack

    D. A dictionary attack

  • Question 3:

    Mark is an attacker. He wants to discover wireless LANs by listening to beacons or sending probe requests and thereby provide a launch point for further attacks.

    Which of the following tools can he use to accomplish the task?

    A. DStumbler

    B. Wellenreiter

    C. KisMAC

    D. Airmon-ng

  • Question 4:

    Which of the following standards is used in wireless local area networks (WLANs)?

    A. IEEE 802.4

    B. IEEE 802.3

    C. IEEE 802.5

    D. IEEE 802.11b

  • Question 5:

    You are responsible for a number of Windows Server 2003 DNS servers on a large corporate network. You have decided to audit the DNS server logs.

    Which of the following are likely errors you could encounter in the log? (Choose two)

    A. The DNS server could not create FTP socket for address [IP address of server].

    B. The DNS server could not open socket for domain name [domain name of server].

    C. The DNS server could not create a Transmission Control Protocol (TCP) socket.

    D. The DNS server could not open socket for address [IP address of server].

  • Question 6:

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server.

    He is suggesting this as a countermeasure against __________.

    A. NetBIOS NULL session

    B. DNS zone transfer

    C. IIS buffer overflow

    D. SNMP enumeration

  • Question 7:

    You are tasked with configuring your routers with a minimum security standard that includes the following:

    A local Username and Password configured on the router A strong privilege mode password Encryption of user passwords Configuring telnet and ssh to authenticate against the router user database Choose the configuration that best meets

    these requirements.

    A. RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56eand$te RouterA(config)#line vty 0 4 RouterA(config-line)#login

    B. RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable password n56eand$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

    C. RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56eand$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

    D. RouterA(config)#service enable-password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56eand$te RouterA(config)#line vty 0 4 RouterA(config-line)#login user

  • Question 8:

    This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes:

    A. War driving

    B. Detecting unauthorized access points

    C. Detecting causes of interference on a WLAN d.WEP ICV error tracking

    D. Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.

    E. THC-Scan

    F. NetStumbler

    G. Absinthe

    H. Kismet

  • Question 9:

    Data access auditing is a surveillance mechanism that watches over access to all sensitive information contained within the database.

    What are the questions addressed in a perfect data access auditing solution?

    A. Who accessed the data?

    B. When was the data accessed?

    C. For whom was the data accessed?

    D. What was the SQL query that accessed the data?

  • Question 10:

    In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits.

    Which of the following categories of audit standards established by GAAS are related to professional and technical competence, independence, and professional due care?

    A. Reporting standards

    B. Risk Analysis standards

    C. General standards

    D. Fieldwork standards

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.