Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


388 Students Passed

96% Average Score

94% Same Questions
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:

A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Questions # 2:

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:

A.

A DNS Zone

B.

An Intranet

C.

A stub zone

D.

A demilitarized zone (DMZ)

Questions # 3:

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

Question # 3

Options:

A.

Snooping

B.

UDP port scanning

C.

Firewalking

D.

Port redirection

Questions # 4:

You work as a Network Analyst for XYZ CORP. The company has a Unix-based network. You want to view the directories in alphabetical order. Which of the following Unix commands will you use to accomplish the task?

Options:

A.

cat

B.

chmod

C.

cp

D.

ls

Questions # 5:

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Options:

A.

Snort

B.

IDS

C.

Firewall

D.

WIPS

Questions # 6:

You want to append a tar file if the on-disk version of the tar file has a modification date more recent than its copy in the tar archive. Which of the following commands will you use to accomplish the task?

Options:

A.

tar -u

B.

tar -t

C.

tar -c

D.

tar –x

Questions # 7:

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

Options:

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

Questions # 8:

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based Enterprise network. The company uses Cisco IOS technologies in the Enterprise network. You have enabled system message logging (syslog) service on all the routers that are currently working in the network. The syslog service provides all the reports, and important error and notification messages. You want to store all the reports and messages. Choose the locations where you can store all of these.

Options:

A.

Auxiliary

B.

Buffer

C.

Syslog server

D.

tty lines

E.

Console

Questions # 9:

Sam works as a Network Administrator for XYZ CORP. The computers in the company run Windows Vista operating system, and they are continuously connected to the Internet. This makes the network of the company susceptible to attacks from unauthorized users. Which of the following will Sam choose to protect the network of the company from such attacks?

Options:

A.

Firewall

B.

Windows Defender

C.

Software Explorer

D.

Quarantined items

Questions # 10:

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Incontrovertible

B.

Corroborating

C.

Direct

D.

Circumstantial

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.