Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following statements about the element are true?

Options:

A.

It has as one of its sub-elements.

B.

If there is no sub-element, no HTTP method will be constrained.

C.

It can have at the most one sub-element.

D.

It is a sub-element of the element.

Questions # 72:

Which of the following is a type of web site monitoring that is done using web browser emulation or scripted real web browsers?

Options:

A.

Route analytics

B.

Passive monitoring

C.

Network tomography

D.

Synthetic monitoring

Questions # 73:

Which of the following statements are true about a hot site?

Options:

A.

It is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

B.

It is the most inexpensive backup site.

C.

It can be used within an hour for data recovery.

D.

It is cheaper than a cold site but more expensive than a worm site.

Questions # 74:

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Options:

A.

Gathering private and public IP addresses

B.

Collecting employees information

C.

Performing Neotracerouting

D.

Banner grabbing

Questions # 75:

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

Options:

A.

Setting up of monitoring on ISA Server

B.

Defining how ISA Server would cache Web contents

C.

Defining ISA Server network configuration

D.

Configuration of VPN access

Questions # 76:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Questions # 77:

You work as a Database Administrator for BigApple Inc. The Company uses Oracle as its database. You enabled standard database auditing. Later, you noticed that it has a huge impact on performance of the database by generating a large amount of audit data. How will you keep control on this audit data?

Options:

A.

By implementing principle of least privilege.

B.

By removing some potentially dangerous privileges.

C.

By setting the REMOTE_LOGIN_PASSWORDFILE instance parameter to NONE.

D.

By limiting the number of audit records generated to only those of interest.

Questions # 78:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to check the status of the printer and set its state. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

banner

B.

lpq

C.

lpc

D.

lpr

Questions # 79:

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Options:

A.

It uses password hash for client authentication.

B.

It uses a public key certificate for server authentication.

C.

It is supported by all manufacturers of wireless LAN hardware and software.

D.

It provides a moderate level of security.

Questions # 80:

Which of the following is a basic feature of the Unix operating system? (Choose three)

Options:

A.

It is highly portable across hardware.

B.

All files can be individually protected using read, write, and execute permissions for the user, group, and others.

C.

It allows all the modules to be loaded into memory.

D.

A user can execute multiple programs at the same time from a single terminal.

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.