Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following tools can be used by a user to hide his identity?

Options:

A.

War dialer

B.

IPchains

C.

Proxy server

D.

Rootkit

E.

Anonymizer

Questions # 22:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server: Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Options:

A.

PsPasswd

B.

WinSSLMiM

C.

PsFile

D.

UserInfo

Questions # 23:

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up a honey pot

B.

Vulnerability scanning

C.

Setting up IDS

D.

Port scanning

Questions # 24:

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?

Options:

A.

Network mapper

B.

Protocol analyzer

C.

A port scanner

D.

Packet sniffer

Questions # 25:

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address 210.213.23.21. This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

Options:

A.

24171811

B.

24619311

C.

24171111

D.

24171311

Questions # 26:

You work as a Software Developer for UcTech Inc. You want to create a new session. Which of the following methods can you use to accomplish the task?

Options:

A.

getNewSession(true)

B.

getSession(false)

C.

getSession()

D.

getSession(true)

E.

getNewSession()

Questions # 27:

Which of the following NFS mount options specifies whether a program using a file via an NFS connection should stop and wait for the server to come back online, if the host serving the exported file system is unavailable, or if it should report an error?

Options:

A.

intr

B.

hard or soft

C.

nfsvers=2 or nfsvers=3

D.

fsid=num

Questions # 28:

Which of the following commands can be used to format text files?

Options:

A.

wc

B.

ps

C.

tail

D.

pr

Questions # 29:

Which of the following statements is true about residual risks?

Options:

A.

It is the probabilistic risk after implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk before implementing all security measures.

Questions # 30:

Which of the following are the countermeasures against WEP cracking?

Options:

A.

Using the longest key supported by hardware.

B.

Changing keys often.

C.

Using a non-obvious key.

D.

Using a 16 bit SSID.

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.