Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

You want to change the number of characters displaying on the screen while reading a txt file. However, you do not want to change the format of the txt file. Which of the following commands can be used to view (but not modify) the contents of the text file on the terminal screen at a time?

Options:

A.

cat

B.

tail

C.

less

D.

more

Questions # 32:

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

Options:

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

Questions # 33:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open? (Choose two)

Options:

A.

25

B.

20

C.

80

D.

110

Questions # 34:

What is the purpose of Cellpadding attribute of

tag?

Options:

A.

Cellpadding is used to set the width of cell border and its content.

B.

Cellpadding is used to set the width of a table.

C.

Cellpadding is used to set the space between the cell border and its content.

D.

Cellpadding is used to set the space between two cells in a table.

Questions # 35:

Which of the following is an example of penetration testing?

Options:

A.

Configuring firewall to block unauthorized traffic

B.

Implementing HIDS on a computer

C.

Simulating an actual attack on a network

D.

Implementing NIDS on a network

Questions # 36:

Which of the following commands can be used to intercept and log the Linux kernel messages?

Options:

A.

syslogd

B.

klogd

C.

sysklogd

D.

syslog-ng

Questions # 37:

Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time. Which of the following options will he choose to accomplish the task?

Options:

A.

User cannot change password

B.

Delete temporary password at next logon

C.

User must change password at next logon

D.

Password never expires

Questions # 38:

You are the Network Administrator for a company. You have decided to conduct a user access and rights review. Which of the following would be checked during such a review? (Choose three)

Options:

A.

Access Control Lists

B.

Encryption Methods

C.

User Roles

D.

Firewalls

E.

Group Membership

Questions # 39:

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection? (Choose two)

Options:

A.

Hardening the server OS

B.

Using either WEP or WPA encryption

C.

MAC filtering on the router

D.

Strong password policies on workstations.

E.

Not broadcasting SSID

Questions # 40:

Which of the following statements is NOT true about FAT16 file system?

Options:

A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

B.

FAT16 file system supports file-level compression.

C.

FAT16 does not support file-level security.

D.

FAT16 file system supports Linux operating system.

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.