Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following statements about data integrity of a container are true? (Choose two)

Options:

A.

It ensures that a hacker cannot alter the contents of an HTTP message while it is in transit from a container to a client.

B.

Data integrity ensures that information is made available to users who are authorized to access it.

C.

Data integrity ensures that information has not been modified by a third party while it is in transit.

D.

It ensures that an eavesdropper cannot read an HTTP message being sent from a client to a container.

Questions # 42:

Which of the following can be the countermeasures to prevent NetBIOS NULL session enumeration in Windows 2000 operating systems?

Options:

A.

Denying all unauthorized inbound connections to TCP port 53

B.

Disabling SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface

C.

Editing the registry key HKLM\SYSTEM\CurrentControlSet\LSA and adding the value RestrictAnonymous

D.

Disabling TCP port 139/445

Questions # 43:

Which of the following statements are true about SSIDs?

Options:

A.

Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

B.

SSIDs are case insensitive text strings and have a maximum length of 64 characters.

C.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

D.

SSID is used to identify a wireless network.

Questions # 44:

Which of the following commands can be used to find out where commands are located?

Options:

A.

type

B.

which

C.

env

D.

ls

Questions # 45:

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. You use DumpSec as an auditing and reporting program for security issues. Which of the following statements is true about DumpSec? (Choose three)

Options:

A.

It obtains the DACLs for the registry.

B.

It dumps user and group information.

C.

It collates the DACLs for the file system.

D.

It kills the running services in the Windows environment.

Questions # 46:

Which of the following policies helps reduce the potential damage from the actions of one person?

Options:

A.

CSA

B.

Separation of duties

C.

Internal audit

D.

Risk assessment

Questions # 47:

Which of the following statements about invalidating a session is true?

Options:

A.

The getCreationTime() method can be called on an invalidated session.

B.

The invalidate() method belongs to the HttpServletRequest interface.

C.

A session can be invalidated programmatically as well as using the deployment descriptor.

D.

The getAttribute(String name) method throws an IllegalArgumentException if called on an invalidated session.

Questions # 48:

You work as a Software Developer for Cinera Softwares Inc. You create a DHTML page that contains ten TextBox controls to get information from the users who use your application. You want all the components placed on the DHTML page to be repositioned dynamically, when a user resizes the browser window. Which of the following will you use for this?

Options:

A.

Use the position attribute of the Cascading Style Sheet.

B.

Use the OnResize event for the DHTML page object.

C.

Use the Resize event of the Document object.

D.

Use the OnResize event of the Cascading Style Sheet.

Questions # 49:

You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group. Which of the following code snippets imperatively demands that the current user is a member of the local Users group?

Options:

A.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();

B.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();

C.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

D.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

Questions # 50:

Which of the following are attributes of the

tag? (Choose three)

Options:

A.

BORDER

B.

ALIGN

C.

TD

D.

WIDTH

tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the
tag is used to set the width of the table border. Answer: C is incorrect.
is not an attribute of the tag. It is a tag used to specify cells in a table.

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.