Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 11 out of 11 pages
Viewing questions 101-110 out of questions
Questions # 101:

Mark works as a project engineer in Tech Perfect Inc. His office is configured with Windows XP-based computers. The computer that he uses is not configured with a default gateway. He is able to access the Internet, but is not able to use e-mail services via the Internet. However, he is able to access e-mail services via the intranet of the company. Which of the following could be the reason of not being able to access e-mail services via the Internet?

Options:

A.

Proxy server

B.

IP packet filter

C.

Router

D.

Protocols other than TCP/IP

Questions # 102:

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card? (Choose two)

Options:

A.

These tools can determine the rogue access point even when it is attached to a wired network.

B.

These tools can determine the authorization status of an access point.

C.

These tools cannot detect rogue access points if the victim is using data encryption.

D.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

Questions # 103:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to find out when a particular user was last logged in. To accomplish this, you need to analyze the log configuration files. Which of the following Unix log configuration files can you use to accomplish the task?

Options:

A.

/var/log/btmp

B.

/var/log/messages

C.

/var/log/lastlog

D.

/var/log/wtmp

Questions # 104:

You work as the Project Engineer for XYZ CORP. The company has a Unix-based network. Your office consists of one server, seventy client computers, and one print device. You raise a request for printing a confidential page. After 30 minutes, you find that your print request job is not processed and is at the seventh position in the printer queue. You analyze that it shall take another one hour to print. You decide to remove your job from the printer queue and get your page printed outside the office. Which of the following Unix commands can you use to remove your job from the printer queue?

Options:

A.

tunelp

B.

pr

C.

lprm

D.

gs

Questions # 105:

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

(Choose two)

Options:

A.

WPA2 -EAP

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Questions # 106:

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

Options:

A.

20

B.

443

C.

80

D.

21

Questions # 107:

Which of the following encryption encoding techniques is used in the basic authentication method?

Options:

A.

HMAC_MD5

B.

Md5

C.

DES (ECB mode)

D.

Base64

Questions # 108:

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Safeguards

B.

Detective controls

C.

Corrective controls

D.

Preventive controls

Questions # 109:

Which of the following is Microsoft's implementation of the file and application server for the Internet and private intranets?

Options:

A.

Internet Server Service (ISS)

B.

Internet Server (IS)

C.

WWW Server (WWWS)

D.

Internet Information Server (IIS)

Questions # 110:

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Viewing page 11 out of 11 pages
Viewing questions 101-110 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.