Exam Details

  • Exam Code
    :GSNA
  • Exam Name
    :GIAC Systems and Network Auditor
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :413 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GSNA Questions & Answers

  • Question 31:

    Which of the following statements is true about the Digest Authentication scheme?

    A. A valid response from the client contains a checksum of the username, the password, the given random value, the HTTP method, and the requested URL.

    B. In this authentication scheme, the username and password are passed with every request, not just when the user first types them.

    C. The password is sent over the network in clear text format.

    D. It uses the base64 encoding encryption scheme.

  • Question 32:

    You have detected what appears to be an unauthorized wireless access point on your network. However, this access point has the same MAC address as one of your real access points and is broadcasting with a stronger signal.

    What is this called?

    A. Buesnarfing

    B. The evil twin attack

    C. WAP cloning

    D. DOS

  • Question 33:

    You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross- Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

    A. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

    B. Look at the Web servers logs and normal traffic logging.

    C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

    D. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

  • Question 34:

    Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services. Which of the following are the techniques used for network mapping by large organizations?

    Each correct answer represents a complete solution. Choose three.

    A. Route analytics

    B. Active Probing

    C. SNMP-based approaches

    D. Packet crafting

  • Question 35:

    You have been assigned a project to develop a Web site for a construction company. You plan to develop a Web site and want to get more control over the appearance and presentation of the Web pages. You also want to increase your ability to precisely specify the position and appearance of the elements on a page and create special effects. You plan to use cascading style sheets (CSS). You want to define styles only for the active page.

    Which type of style sheet will you use?

    A. Embedded Style Sheet

    B. Inline Style Sheet

    C. Internal Style Sheet

    D. External Style Sheet

  • Question 36:

    Brutus is a password cracking tool that can be used to crack the following authentications: HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 (Post Office Protocol v3) FTP (File Transfer Protocol) SMB (Server Message Block) Telnet Which of the following attacks can be performed by Brutus for password cracking?

    A. Man-in-the-middle attack

    B. Hybrid attack

    C. Replay attack

    D. Brute force attack

    E. Dictionary attack

  • Question 37:

    John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail.

    Which of the following techniques is he performing to accomplish his task?

    A. Web ripping

    B. Steganography

    C. Email spoofing

    D. Social engineering

  • Question 38:

    Which of the following backup sites takes the longest recovery time?

    A. Mobile backup site

    B. Warm site

    C. Cold site

    D. Hot site

  • Question 39:

    You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

    A. Open up all the unused management ports.

    B. Set similar passwords for each management port.

    C. Set long session timeouts.

    D. Ignore usage of the default account settings.

  • Question 40:

    You are the Network Admin for a company. You are concerned about users having access to items they should not. Your concern is that they may inadvertently have been granted access to those resources. When conducting a user access and rights review, which of the following is most likely to show you such unintentional granting of user rights?

    A. IDS Logs

    B. Access Control Lists

    C. Server logs

    D. Group Membership

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.