Exam Details

  • Exam Code
    :GSNA
  • Exam Name
    :GIAC Systems and Network Auditor
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :413 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GSNA Questions & Answers

  • Question 21:

    You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You want to take a snapshot of the router running configuration and archive running configuration of the router to persistent storage.

    Which of the following steps will you take?

    A. Secure the boot configuration

    B. Restore an archived primary bootset

    C. Verify the security of the bootset

    D. Enable the image resilience

  • Question 22:

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He executes the following command in the terminal: echo $USER, $UID.

    Which of the following will be displayed as the correct output of the above command?

    A. John, 0

    B. root, 0

    C. root, 500

    D. John, 502

  • Question 23:

    You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall.

    While configuring ISA Server 2006, which of the following is NOT necessary?

    A. Setting up of monitoring on ISA Server

    B. Defining how ISA Server would cache Web contents

    C. Defining ISA Server network configuration

    D. Configuration of VPN access

  • Question 24:

    Which of the following commands will you use to watch a log file /var/adm/messages while the log file is updating continuously?

    A. less -g /var/adm/messages

    B. tail /var/adm/messages

    C. cat /var/adm/messages

    D. tail -f /var/adm/messages

  • Question 25:

    Mark works as the Network Administrator for XYZ CORP. The company has a Unix-based network. Mark wants to scan one of the Unix systems to detect security vulnerabilities. To accomplish this, he uses TARA as a system scanner.

    What can be the reasons that made Mark use TARA?

    A. It has a very specific function of seeking paths to root.

    B. It is composed mostly of bash scripts

    C. It works on a wide variety of platforms.

    D. It is very modular.

  • Question 26:

    Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. The Manager of the company requires Mark to use tables instead of frames in the Web site.

    What is the major advantage that a table-structured Web site has over a frame-structured Web site?

    A. Easy maintenance

    B. Speed

    C. Better navigation

    D. Capability of being bookmarked or added to the Favorites folder

  • Question 27:

    Samantha works as a Web Developer for XYZ CORP. She develops a Web application using Visual InterDev. She wants to group a series of HTML elements together so that an action can be performed collectively on them.

    Which of the following tags will Samantha use to accomplish this?

    A. DIV

    B. GROUP

    C. BODY

    D. SPAN

  • Question 28:

    Which of the following are the disadvantages of Dual-Homed Host Firewall Architecture?

    A. It can provide services by proxying them.

    B. It can provide a very low level of control.

    C. User accounts may unexpectedly enable services a user may not consider secure.

    D. It provides services when users log on to the dual-homed host directly.

  • Question 29:

    You want to monitor the network infrastructure of a software-based company. The network infrastructure of the company consists of the following:

    1.

    Windows TCP/IP services

    2.

    Web and mail servers

    3.

    URLs Applications (MS Exchange, SQL etc.)

    Which of the following network monitoring solutions can you use to accomplish the task?

    A. Axence nVision

    B. CommandCenter NOC

    C. Netmon

    D. Cymphonix Network Composer

  • Question 30:

    You work as a Network Administrator for Techpearl Inc. You are configuring the rules for the firewall of the company. You need to allow internal users to access secure external websites. Which of the following firewall rules will you use to accomplish the task?

    A. TCP 172.16.1.0/24 any any 80 HTTP permit

    B. TCP 172.16.1.0/24 any any 25 SMTP permit

    C. TCP 172.16.1.0/24 any any 80 HTTP deny

    D. TCP 172.16.1.0/24 any any 443 HTTPs permit

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.