Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Audit GSNA GSNA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSNA Premium Access

View all detail and faqs for the GSNA exam


741 Students Passed

93% Average Score

97% Same Questions
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Perform Quantitative Risk Analysis

B.

Monitor and Control Risks

C.

Perform Qualitative Risk Analysis

D.

Identify Risks

Questions # 82:

You work as the Network Administrator for XYZ CORP. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see first five lines of the file /etc/passwd. Which of the following commands should you use to accomplish the task?

Options:

A.

head -n 5 /etc/passwd

B.

head 5 -n /etc/passwd

C.

tail -n 5 /etc/passwd

D.

head /etc/passwd

Questions # 83:

Andrew works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domain-based network. The network has five Windows 2003 member servers and 150 Windows XP Professional client computers. One of the member servers works as an IIS server. The IIS server is configured to use the IP address 142.100.10.6 for Internet users and the IP address 16.5.7.1 for the local network. Andrew wants the server to allow only Web communication over the Internet. He also wants to enable the local network users to access the shared folders and other resources. How will Andrew configure the IIS server to accomplish this? (Choose three)

Options:

A.

Enable the IP packet filter.

B.

Permit all the ports on the network adapter that uses the IP address 142.100.10.6.

C.

Permit only port 25 on the network adapter that uses the IP address 142.100.10.6.

D.

Permit all the ports on the network adapter that uses the IP address 16.5.7.1.

E.

Permit only port 80 on the network adapter that uses the IP address 142.100.10.6.

Questions # 84:

What are the purposes of audit records on an information system? (Choose two)

Options:

A.

Upgradation

B.

Backup

C.

Troubleshooting

D.

Investigation

Questions # 85:

What are the different categories of PL/SQL program units?

Options:

A.

Default

B.

Unnamed

C.

Primary

D.

Named

Questions # 86:

You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?

Options:

A.

tail -n 3 /var/adm/messages

B.

tail -f /var/adm/messages

C.

cat /var/adm/messages

D.

tail /var/adm/messages

Questions # 87:

You are responsible for a large network that has its own DNS servers. You periodically check the log to see if there are any problems. Which of the following are likely errors you might encounter in the log? (Choose three)

Options:

A.

The DNS server could not create FTP socket for address [IP address of server]

B.

The DNS server could not create an SMTP socket

C.

Active Directory Errors

D.

The DNS server could not create a Transmission Control Protocol (TCP) socket

E.

The DNS server could not initialize the Remote Procedure Call (RPC) service

Questions # 88:

You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?

Options:

A.

The computers and their applications should be used for organizational related activities only.

B.

Computers may not be left unattended with a user account still logged on.

C.

Applications other than those supplied or approved by the company can be installed on any computer.

D.

The installed e-mail application can only be used as the authorized e-mail service.

Questions # 89:

Which of the following allows the use of multiple virtual servers using different DNS names resolved by the same IP address?

Options:

A.

HTTP 1.1

B.

JAVA

C.

HTML

D.

VPN

Questions # 90:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to see the list of the filesystems mounted automatically at startup by the mount -a command in the /etc/rc startup file. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/named.conf

B.

/etc/groups

C.

/etc/mtab

D.

/etc/fstab

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.