Exam Details

  • Exam Code
    :GSNA
  • Exam Name
    :GIAC Systems and Network Auditor
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :413 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GSNA Questions & Answers

  • Question 41:

    John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server.

    Which of the following are countermeasures against a brute force attack?

    A. The site should use CAPTCHA after a specific number of failed login attempts.

    B. The site should increase the encryption key length of the password.

    C. The site should restrict the number of login attempts to only three times.

    D. The site should force its users to change their passwords from time to time.

  • Question 42:

    Which of the following types of firewall ensures that the packets are part of the established session?

    A. Stateful inspection firewall

    B. Switch-level firewall

    C. Circuit-level firewall

    D. Application-level firewall

  • Question 43:

    One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PD A. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?

    A. Spam

    B. Blue snarfing

    C. A virus

    D. Blue jacking

  • Question 44:

    Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

    A. Warkitting

    B. War driving

    C. Wardialing

    D. Demon dialing

  • Question 45:

    Pervasive IS controls can be used across all the internal departments and external contractors to define the direction and behavior required for the technology to function properly.

    When these controls are implemented properly, which of the following areas show the reliability improvement? (Choose three)

    A. Hardware development

    B. Software development

    C. Security administration

    D. Disaster recovery

  • Question 46:

    Which of the following are the limitations for the cross site request forgery (CSRF) attack?

    A. The attacker must determine the right values for all the form inputs.

    B. The attacker must target a site that doesn't check the referrer header.

    C. The target site should have limited lifetime authentication cookies.

    D. The target site should authenticate in GET and POST parameters, not only cookies.

  • Question 47:

    You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN.

    Which of the following is the required information that you will need to configure the client computer? (Choose two)

    A. SSID of the WLAN

    B. WEP key

    C. IP address of the router

    D. MAC address of the router

  • Question 48:

    Which of the following statements about the /etc/profile file are true?

    A. It allows a system administrator to create a default home directory for all new users on a computer.

    B. A user can change the settings of the /etc/profile file, but he cannot delete the file. It can only be deleted by the root user.

    C. It can change the default umask value.

    D. It is used to configure and control system-wide default variables.

  • Question 49:

    Which of the following are attributes of the

    tag? (Choose three)

    A. BORDER

    B. ALIGN

    C. TD

    D. WIDTH

    tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be

    set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the

    tag is used to set the width of the table border.

    Answer C is incorrect.

    is not an attribute of the tag. It is a tag used to specify cells in a table.

  • Question 50:

    You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to make changes on a per-directory basis.

    Which of the following Unix configuration files can you use to accomplish the task?

    A. $HOME/.profile

    B. $HOME/Xrootenv.0

    C. $HOME/.htaccess

    D. /var/log/btmp

  • Tips on How to Prepare for the Exams

    Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.