Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following types of authentication tokens forms a logical connection to the client computer but does not require a physical connection?

Options:

A.

Virtual token

B.

Connected token

C.

Disconnected token

D.

Contactless token

Questions # 12:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

UDP

B.

RPC

C.

IDLE

D.

TCP SYN/ACK

Questions # 13:

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires fast processing of the data in the database of the company so that answers to queries can be generated quickly. To provide fast processing, you have a conceptual idea of representing the dimensions of data available to a user in the data cube format. Which of the following systems can you use to implement your idea?

Options:

A.

SYSDBA

B.

MDDBMS

C.

Federated database system

D.

Hierarchical database system

Questions # 14:

You are the Security Administrator for an Internet Service Provider. From time to time your company gets subpoenas from attorneys and law enforcement for records of customers' access to the internet. What policies must you have in place to be prepared for such requests?

Options:

A.

Group access policies

B.

Backup policies

C.

User access policies

D.

Storage and retention policies

Questions # 15:

You work as a Network Administrator for Tech-E-book Inc. You are configuring the ISA Server 2006 firewall to provide your company with a secure wireless intranet. You want to accept inbound mail delivery though an SMTP server. What basic rules of ISA Server do you need to configure to accomplish the task.

Options:

A.

Publishing rules

B.

Network rules

C.

Mailbox rules

D.

Access rules

Questions # 16:

You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security. Which of the following devices would you use to accomplish the task?

Options:

A.

Proxy server

B.

IDS

C.

Packet filtering firewall

D.

honeypot

Questions # 17:

Choose the benefits of deploying switches over hubs in your infrastructure. (Choose two)

Options:

A.

Layer 2 switches allow for the creation of Virtual LANs providing options for further segmentation and security.

B.

Switches lower the number of collisions in the environment.

C.

Switches create an environment best suited for half duplex communications. This improves network performance and the amount of available bandwidth.

D.

Layer 2 switches increase the number of broadcast domains in the environment.

Questions # 18:

Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?

Options:

A.

149 and 133

B.

203 and 333

C.

139 and 445

D.

198 and 173

Questions # 19:

The following output is generated by running the show ip route command: RouterA#show ip route < - - Output Omitted for brevity - -> Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:

A.

192.168.10.0

B.

172.18.60.1

C.

172.18.50.1

D.

172.18.1.1

Questions # 20:

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? (Choose three)

Options:

A.

Configure the authentication type for the wireless LAN to Shared Key

B.

On each client computer, add the SSID for the wireless LAN as the preferred network

C.

Install a firewall software on each wireless access point

D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points

E.

Configure the authentication type for the wireless LAN to Open system

F.

Broadcast SSID to connect to the access point (AP)

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.