Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

Options:

A.

Change hub with switch.

B.

Deploying a powerful antenna.

C.

Disabling SSID broadcast.

D.

Implement WEP.

Questions # 52:

Which of the following types of audit constructs a risk profile for existing and new projects?

Options:

A.

Technological position audit

B.

Technological innovation process audit

C.

Innovative comparison audit

D.

Client/Server, Telecommunications, Intranets, and Extranets audits

Questions # 53:

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of specific types of packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It is used to store information about confidential data.

Questions # 54:

One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PD A. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?

Options:

A.

Spam

B.

Blue snarfing

C.

A virus

D.

Blue jacking

Questions # 55:

Data mining is a process of sorting through data to identify patterns and establish relationships. Which of the following data mining parameters looks for patterns where one event is connected to another event?

Options:

A.

Sequence or path analysis

B.

Forecasting

C.

Clustering

D.

Association

Questions # 56:

In which of the following attack techniques does an attacker try to intercept the successful handshake and then use a dictionary attack to retrieve the shared key?

Options:

A.

Shared key guessing

B.

Brute force attack

C.

Dictionary attack

D.

PSK cracking

Questions # 57:

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Options:

A.

Dynamic key encryption

B.

Public key certificate for server authentication

C.

Strongest security level

D.

Password hash for client authentication

Questions # 58:

Data access auditing is a surveillance mechanism that watches over access to all sensitive information contained within the database. What are the questions addressed in a perfect data access auditing solution?

Options:

A.

Who accessed the data?

B.

When was the data accessed?

C.

For whom was the data accessed?

D.

What was the SQL query that accessed the data?

Questions # 59:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mke2fs

B.

mkswap

C.

mkfs

D.

hdparm

Questions # 60:

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. You have installed a Windows Server 2008 computer as the domain controller. The client computers of the company use the Windows XP Professional operating system. When a user logs on to a client computer, it gets authenticated by the domain controller. You want to audit the logon events that would be generated on the domain controller. Which of the following audit settings do you need to configure to accomplish the task?

Options:

A.

Audit account management

B.

Audit logon events

C.

Audit directory service access

D.

Audit account logon events

Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.