Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following types of servers are dedicated to provide resources to hosts on the network? (Choose three)

Options:

A.

Web servers

B.

Monitoring servers

C.

Mail servers

D.

Default gateway servers

E.

Print servers

Questions # 62:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

Options:

A.

The laptop will be able to access the wireless network but the security will be compromised.

B.

The WAP will allow the connection with the guest account's privileges.

C.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

D.

The laptop will not be able to access the wireless network.

Questions # 63:

Mark is an attacker. He wants to discover wireless LANs by listening to beacons or sending probe requests and thereby provide a launch point for further attacks. Which of the following tools can he use to accomplish the task?

Options:

A.

DStumbler

B.

Wellenreiter

C.

KisMAC

D.

Airmon-ng

Questions # 64:

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?

Options:

A.

Multi-Authentication

B.

Port security

C.

MAC Authentication Bypass

D.

Quality of Service (QoS)

Questions # 65:

Which of the following is an attempt to give false information or to deny that a real event or transaction should have occurred?

Options:

A.

A DDoS attack

B.

A repudiation attack

C.

A reply attack

D.

A dictionary attack

Questions # 66:

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:

A.

NTLM authentication

B.

Digest authentication

C.

Microsoft Passport authentication

D.

Basic authentication

Questions # 67:

In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route. What are the benefits of using a static route?

Options:

A.

It is a fault tolerant path.

B.

It reduces load on routers, as no complex routing calculations are required.

C.

It reduces bandwidth usage, as there is no excessive router traffic.

D.

It provides precise control over the routes that packets will take across the network.

Questions # 68:

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below: This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME. Which of the following viruses has the symptoms as the one described above?

Options:

A.

I Love You

B.

Nimda

C.

Chernobyl

D.

Melissa

Questions # 69:

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently backed up his entire Linux hard drive into the my_backup.tgz file. The size of the my_backup.tgz file is 800MB. Now, he wants to break this file into two files in which the size of the first file named my_backup.tgz.aa should be 600MB and that of the second file named my_backup.tgz.ab should be 200MB. Which of the following commands will John use to accomplish his task?

Options:

A.

split --verbose -b 200m my_backup.tgz my_backup.tgz

B.

split --verbose -b 200m my_backup.tgz my_backup.tgz

C.

split --verbose -b 600m my_backup.tgz my_backup.tgz

D.

split --verbose -b 600m my_backup.tgz my_backup.tgz

Questions # 70:

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

Options:

A.

Tiny

B.

NetBus

C.

Trojan Man

D.

EliteWrap

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.