Exam Details

  • Exam Code
    :GSNA
  • Exam Name
    :GIAC Systems and Network Auditor
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :413 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GSNA Questions & Answers

  • Question 11:

    Which of the following tags will create two vertical frames, as given in the image below, where the left frame is half as wide as the right one?

    A.

    B.

    C.

    D.

    E.

  • Question 12:

    You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities.

    Which of the following vulnerabilities can be fixed using Nessus?

    A. Vulnerabilities that allow a remote cracker to control sensitive data on a system

    B. Misconfiguration (e.g. open mail relay, missing patches, etc.)

    C. Vulnerabilities that allow a remote cracker to access sensitive data on a system

    D. Vulnerabilities that help in Code injection attacks

  • Question 13:

    You work as the Network Administrator for a company. You configure a Windows 2000-based computer as the Routing and Remote Access server, so that users can access the company's network, remotely. You want to log a record of all the users who access the network by using Routing and Remote Access.

    What will you do to log all the logon activities?

    A. On the Routing and Remote Access server, enable log authentication requests in auditing, and define the path for the log file in Remote Access Logging.

    B. On the Routing and Remote Access server, enable log authentication requests in Remote Access Logging.

    C. On the Routing and Remote Access server, enable log authentication requests in auditing.

    D. Do nothing as the Windows 2000-based Routing and Remote Access server automatically creates a log record for each connection attempt.

  • Question 14:

    What is the extension of a Cascading Style Sheet?

    A. .hts

    B. .cs

    C. .js

    D. .css

  • Question 15:

    Which of the following is a basic feature of the Unix operating system? (Choose three) A. It is highly portable across hardware.

    B. All files can be individually protected using read, write, and execute permissions for the user, group, and others.

    C. It allows all the modules to be loaded into memory.

    D. A user can execute multiple programs at the same time from a single terminal.

  • Question 16:

    Which of the following statements are true about a hot site?

    A. It is a duplicate of the original site of the organization, with full computer systems as well as near- complete backups of user data.

    B. It is the most inexpensive backup site.

    C. It can be used within an hour for data recovery.

    D. It is cheaper than a coldsite but more expensive than a worm site.

  • Question 17:

    You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

    You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task.

    Which of the following actions will you perform to accomplish the task?

    A. Create a scheduled task to download definition files for Windows Defender every Sunday.

    B. Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

    C. Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

    D. Click the arrow beside the Help button Click the Check for updates option.

  • Question 18:

    What are the purposes of audit records on an information system? (Choose two)

    A. Upgradation

    B. Backup

    C. Troubleshooting

    D. Investigation

  • Question 19:

    Which of the following statements are true about WPA?

    A. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.

    B. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.

    C. WPA-PSK converts the passphrase into a 256-bit key.

    D. WPA provides better security than WEP.

  • Question 20:

    You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to do RARP mapping from hardware mapping addresses to IP addresses.

    Which of the following Unix configuration files can you use to accomplish the task?

    A. /etc/dhcpd.conf

    B. /etc/motd

    C. /etc/exports

    D. /etc/ethers

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.