Exam Details

  • Exam Code
    :GSNA
  • Exam Name
    :GIAC Systems and Network Auditor
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :413 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GSNA Questions & Answers

  • Question 401:

    HOTSPOT

    John works as an office assistance in an office. The office uses Windows Vista operating system. He wants to disable a program from running on a computer. He opens the Windows Defender window and clicks on the Tools link. He clicks on a link to view the list of programs running on the computer, selects a program and then clicks on the Disable button to disable it. Mark the option that John had chosen to view the list of programs running on the computer.

    Hot Area:

  • Question 402:

    HOTSPOT

    You work as a Network Administrator for uCertify Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. All clients on the network run Windows 2000 Professional. The

    company policy prevents you from installing the Firewall Client software or configuring the Web Proxy service on any client computer. You configure access policy rules to allow all the users to use the HTTP protocol for accessing all Internet

    sites. However, users on the network report that they are unable to do so.

    Mark the option that is configured incorrectly.

    Hot Area:

  • Question 403:

    HOTSPOT

    Sam works as a network administrator in Bluewell Inc. The company uses Windows Vista operating system. He wants to restore a program that is blocked by Windows Defender. He opens the Windows Defender window and clicks on the Tools link. He clicks on a link to view the list of programs blocked by Windows Defender, selects a program and then clicks on the Restore button to restore it. Mark the option that Sam had chosen to view the list of programs blocked by Windows Defender.

    Hot Area:

  • Question 404:

    HOTSPOT

    The network infrastructure of a company consists of a perimeter network. For security purposes, the network zones have been created and divided into a firewall-based Border network and a DMZ. The enterprise internal network is attacked

    by a latest Internet worm.

    Which of the following devices in the enterprise network should be upgraded or reconfigured to counter this type of attack?

    Hot Area:

  • Question 405:

    HOTSPOT

    George works as an Office Assistance in TechSoft Inc. All client computers in the company run Windows Vista operating system. He has turned on the Windows Firewall for security purposes. He prepares a document and wants to share it with other users of the company. When he tries to share the document, he gets a message that firewall has blocked the sharing of the files on his computer. He wants to ensure that that the firewall does not block sharing of the document. He opens Windows Firewall dialog box.

    What actions will he perform in the dialog box to accomplish the task?

    Hot Area:

  • Question 406:

    HOTSPOT

    You work as a Network Administrator for McRobert Inc. The company has a Windows Active Directory-based single domain single forest network. The network includes fifty client computers running different Windows client operating systems.

    A member server named MRIFS is configured as a file server on the network. You are required to implement the following:

    The data communication must be encrypted whenever possible.

    Each client computer must be able to access the server.

    Configure the required options in the dialog box given below in order to accomplish the task.

    Hot Area:

  • Question 407:

    HOTSPOT

    You work as a Network Administrator of a Windows 2000 Active Directory-based single domain network. You have configured your Windows XP Professional computer at home to have a static IP address assigned by your Internet service

    provider (ISP). It is always connected to the Internet through a modem. You have enabled the Internet Connection Firewall for the Internet connection. You use the PING command to check the connectivity of your home computer from office,

    but you receive the following error message:

    Request timed out.

    On examining the log file of the Internet Connection Firewall on your home computer, you find DROP ICMP messages. You want to ping your home computer without compromising on security.

    Select the option in the Internet Connection Firewall Advanced Settings dialog box, which will be required to be checked to accomplish the task.

    Hot Area:

  • Question 408:

    HOTSPOT

    In the image of the Screened Host Firewall Architecture given below, select the element that is commonly known as the access router.

    Hot Area:

  • Question 409:

    SIMULATION

    Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.

    The ________ command supports system logging and kernel message trapping.

  • Question 410:

    SIMULATION

    Fill in the blank with the appropriate term.

    When two routers are used in a firewall configuration, the internal router is known as a ______ router.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.