Professional Documents
Culture Documents
GIAC GSNA v2018-06-01 q400
GIAC GSNA v2018-06-01 q400
GIAC GSNA v2018-06-01 q400
q400
NEW QUESTION: 1
You work as a Network Analyst for XYZ CORP. The company has a Unix-based network. You
want to view the directories in alphabetical order.
Which of the following Unix commands will you use to accomplish the task?
Answer:
C is incorrect. In Unix, the cp command is used for copying files.
NEW QUESTION: 2
DRAG DROP
You are developing a business solution for Haynes Super Leather Inc. A case study for the
organization is given in the exhibit. Based on the case study, you create different modules and
interfaces and want to define the functionality between them. Drag and drop the appropriate
functionalities that will make the interaction possible between modules and/or interfaces. Here,
functionalities can be repetitive.
(Click the Exhibit button on the toolbar to see the case study.)
Select and Place:
Answer:
Explanation/Reference:
Explanation:
The Internet through the restricted HTTP and HTTPS protocols. Therefore, the functionality
between the Corporate Intranet interface and the Internet interface in this diagram should be the
HTTP and HTTPS protocols.
In the case study, it is mentioned that the company uses a Web-based CustomerOrder
application for the existing order placement process.
Therefore, the functionality between the Corporate Intranet interface and the Customer Order
Form module in this diagram should be the Order Placement Process.
The Board of Directors wants to ensure that as soon as a customer clicks the SUBMIT button in
the customer order Web form, he is redirected to a Web page displaying the order payment
details, i.e., the customer payment Web form. Therefore, the functionality between the Customer
Order Form module and the Customer Payment Form module in this diagram should be the Order
Payment Process.
It is very obvious that both the customer order Web form and the customer payment Web form
will interact with the Internet through a client Web browser. Therefore, the functionality between
the Internet interface and the Customer Order Form and Customer Payment Form modules in this
diagram should be the Client Web Browser.
NEW QUESTION: 3
Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the
company. In the Web site, she uses multiple and overlapping style definitions to control the
appearance of HTML elements.
What is this technique known as?
Answer:
A is incorrect. A style sheet is a set of additional tags used to describe the appearance of
individual HTML tags. These tags can
NEW QUESTION: 4
You work as a programmer for uCertify.Inc. You have a session object named session1 with an
attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1.
Which of the following will be used to retrieve Attribute1?
A. Object obj=binding1.getSession().getAttribute("Attribute1");
B. Object obj=binding1.getAttribute("Attribute1");
C. Long MyAttribute=session1.getAttribute("Attribute1");
D. Object obj=session1.getAttribute("Attribute1");
E. Stringstr1=session1.getAttribute("Attribute1");
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The following two code are used to retrieve Attribute1:
1.Object obj=session1.getAttribute("Attribute1"); The getAttribute() method is used to retrieve the
bound object with the specified name in this session, or null if no object is bound under the name.
2.Object obj=binding1.getSession().getAttribute("Attribute1"); The getSession() gets the current
valid session associated with this request. a String object.
B is incorrect. The HttpSessionBindingEvent object cannot use the getAttribute() method.
NEW QUESTION: 5
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do
you need to conduct to resolve the problem?
Answer:
A is incorrect. It is not a valid type of security audit.
NEW QUESTION: 6
Anonymizers are the services that help make a user's own Web surfing anonymous. An
anonymizer removes all the identifying information from a user's computer while the user surfs
the Internet. It ensures the privacy of the user in this manner. After the user anonymizes a Web
access with an anonymizer prefix, every subsequent link selected is also automatically accessed
anonymously.
Which of the following are limitations of anonymizers?
A. ActiveX controls
B. Plugins
C. Secure protocols
D. Java applications
E. JavaScript
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Anonymizers have the following limitations:
1. HTTPS: Secure protocols such as 'https:' cannot be properly anonymized, as the browser
needs to access the site directly to properly maintain the secure encryption.
2.Plugins: If an accessed site invokes a third-party plugin, there is no guarantee of an established
independent direct connection from the user computer to a remote site.
3.Java: Any Java application accessed through an anonymizer will not be able to bypass the Java
security wall.
4.ActiveX: ActiveX applications have almost unlimited access to the user's computer system.
5.JavaScript: The JavaScript scripting language is disabled with URL-based anonymizers.
NEW QUESTION: 7
Which of the following statements about a perimeter network are true? (Choose three)
A. It has a connection to the Internet through an external firewall and a connection to an internal
network through an interior firewall.
B. It has a connection to a private network through an external firewall and a connection to an
internal network through an interior firewall.
C. It is also known as a demilitarized zone or DMZ.
D. It prevents access to the internal corporate network for outside users.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
A perimeter network, also known as a demilitarized zone or DMZ, is a small network that lies in
between the Internet and a private network. It has a connection to the Internet through an external
firewall and a connection to the internal network through an interior firewall. It allows outside
users access to the specific servers located in the perimeter network while preventing access to
the internal corporate network.
Servers, routers, and switches that maintain security by preventing the internal network from
being exposed on the Internet are placed in a perimeter network. A perimeter network is
commonly used for deploying e-mail and Web servers for a company.
NEW QUESTION: 8
Which of the following statements are true about data aggregation?
Answer:
B is incorrect. Data aggregation can be user-based. Personal data aggregation services offer the
user a single point for collection of their personal information from other Web sites. The customer
uses a single master personal identification number (PIN) to give them access to their various
accounts (such as those for financial institutions, airlines, book and music clubs, and so on).
Performing this type of data aggregation is sometimes referred to as "screen scraping."
NEW QUESTION: 9
Which of the following is an Internet mapping technique that relies on various BGP collectors that
collect information such as routing updates and tables and provide this information publicly?
Answer:
A is incorrect. Path MTU discovery (PMTUD) is a technique in computer networking for
determining the maximum transmission unit (MTU) size on the network path between two Internet
Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation. Path MTU discovery works
by setting the DF (Don't Fragment) option bit in the IP headers of outgoing packets. Then, any
device along the path whose MTU is smaller than the packet will drop it, and send back an ICMP
"Fragmentation Needed" (Type 3, Code 4) message containing its MTU, allowing the source host
to reduce its path MTU appropriately. The process repeats until the MTU is small enough to
traverse the entire path without fragmentation. If the path MTU changes after the connection is
set up and is lower than the previously determined path MTU, the first large packet will cause an
ICMP error and the new, lower path MTU will be found. Conversely, if PMTUD finds that the path
allows a larger MTU than what is possible on the lower link, the OS will periodically reprobe to
see if the path has changed and now allows larger packets. On Linux this timer is set by default to
ten minutes.
NEW QUESTION: 10
Answer:
D is incorrect. SocketShield provides a protection shield to a computer system against malware,
viruses, spyware, and various types of keyloggers. SocketShield provides protection at the
following two levels:
1. Blocking: In this level, SocketShield uses a list of IP addresses that are known as purveyor of
exploits.
All http requests for any page in these domains are simply blocked.
2.Shielding: In this level, SocketShield blocks all the current and past IP addresses that are the
cause of unauthorized access.
NEW QUESTION: 11
Which of the following statements are true about the Enum tool?
A. It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information,
etc.
B. It is capable of performing brute force and dictionary attacks on individual accounts of
Windows NT/2000.
C. One of the countermeasures against the Enum tool is to disable TCP port 139/445.
D. It is a console-based Win32 information enumeration utility.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Enum is a console-based Win32 information enumeration utility. It uses null sessions to retrieve
user lists, machine lists, share lists, namelists, group and member lists, passwords, and LSA
policy information. It is also capable of performing brute force and dictionary attacks on individual
accounts. Since the Enum tool works on the NetBIOS NULL sessions, disabling the NetBIOS port
can be a good countermeasure against the Enum tool.
NEW QUESTION: 12
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-
are-secure network.
Which of the following IEEE-based traffic can be sniffed with Kismet?
A. 802.11g
B. 802.11n
C. 802.11b
D. 802.11a
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Kismet can sniff IEEE 802.11a, 802.11b, 802.11g, and 802.11n-based wireless network traffic.
NEW QUESTION: 13
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network.
You want to identify the list of users with special privileges along with the commands that they
can execute.
Which of the following Unix configuration files can you use to accomplish the task?
Answer:
C is incorrect. In Unix, the /proc/modules file shows the kernel modules that are currently loaded.
NEW QUESTION: 14
You have just taken over as the Network Administrator for a medium sized company. You want to
check to see what services are exposed to the outside world.
What tool would you use to accomplish this?
Answer:
D is incorrect. Packet sniffers are used to intercept traffic and to detect the contents of that traffic.
NEW QUESTION: 15
The routing algorithm uses certain variables to create a metric of a path. It is the metric that
actually determines the routing path.
In a metric, which of the following variables is used to define the 'largest size' of a message that
can be routed?
A. Load
B. MTU
C. Hop count
D. Bandwidth
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The routing algorithm uses certain variables to create a metric of a path. It is the metric that is
actually used for path determination. Variables that are used to create a metric of a path are as
follows:
Hop count: It is the total number of routers that a data packet goes through to reach its
destination.
Cost: It is determined by the administrator or calculated by the router.
Bandwidth: It is defined as the bandwidth that the link provides.
Maximum transmission unit (MTU): It is the largest message size that a link can route.
Load: It states the amount of work the CPU has to perform and the number of packets the CPU
needs
to analyze and make calculations on.
NEW QUESTION: 16
Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating
systems?
A. 149 and 133
B. 203 and 333
C. 139 and 445
D. 198 and 173
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
A null session is an anonymous connection to a freely accessible network share called IPC$ on
Windows- based servers. It allows immediate read and write access with Windows NT/2000 and
read-access with Windows XP and 2003. The command to be inserted at the DOS-prompt is as
follows: net use \\IP address_or_host name\ipc$ "" "/user:" net use Port numbers 139 TCP and
445 UDP can be used to start a NULL session attack.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 17
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network.
You want to make changes on a per-directory basis.
Which of the following Unix configuration files can you use to accomplish the task?
Answer:
D is incorrect. In Unix, the /var/log/btmp file is used to store information about failed logins.
NEW QUESTION: 18
Which of the following encryption modes are possible in WEP?
Answer:
C is incorrect. WEP does not support 256 bit encryption.
NEW QUESTION: 19
You want to append a tar file if the on-disk version of the tar file has a modification date more
recent than its copy in the tar archive.
Which of the following commands will you use to accomplish the task?
Answer:
C is incorrect. The tar -c command is used to create a new archive of specified files.
NEW QUESTION: 20
Answer:
A is incorrect. The analysis of risk does not ensure absolute safety. The main purpose of using a
risk-based audit strategy is to ensure that the audit adds value with meaningful information.
NEW QUESTION: 21
You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based
Enterprise network. The company uses Cisco IOS technologies in the Enterprise network. You
have enabled system message logging (syslog) service on all the routers that are currently
working in the network. The syslog service provides all the reports, and important error and
notification messages. You want to store all the reports and messages.
Choose the locations where you can store all of these.
Answer:
A is incorrect. You cannot store syslog messages in the auxiliary line.
NEW QUESTION: 22
Which of the following is Microsoft's implementation of the file and application server for the
Internet and private intranets?
A. Internet Server Service (ISS)
B. Internet Server (IS)
C. WWW Server (WWWS)
D. Internet Information Server (IIS)
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Microsoft Internet Information Server (IIS)is a Web Application server for the Internet and private
intranets.
IIS receives requests from users on the network using the World Wide Web (WWW) service and
transmits information using the Hypertext Transport Protocol (HTTP). IIS uses Microsoft
Transaction Server (MTS) to provide security, performance, and scalability with server side
packages.
NEW QUESTION: 23
Which of the following functions are performed by methods of the HttpSessionActivationListener
interface?
Answer:
B, C are incorrect. These functions are performed by the HttpSessionBindingListener interface.
The HttpSessionBindingListener interface causes an object of the implementing class to be
notified when it is added to or removed from a session. The HttpSessionBindingListener interface
has the following methods:
public void valueBound(event): This method takes an object of type HttpSessionBindingEvent as
an
argument. It notifies the object when it is bound to a session.
public void valueUnbound(HttpSessionBindingEvent event): This method takes an object of type
HttpSessionBindingEvent as an argument. It notifies the object when it is unbound from a
session.
NEW QUESTION: 24
What will be the output of the following command? echo $(date %M) > date.txt
A. The current time (Month) will be written in the date.txt file.
B. It will create a variable $(date %M).
C. It will print a string "date %M".
D. The current time (Minutes) will be written in the date.txt file.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The date command with the %M specifier prints the current time (Minutes). Since the output is
redirected towards the date.txt file, the current time (Minutes) will be printed in the date.txt file.
NEW QUESTION: 25
You are concerned about possible hackers doing penetration testing on your network as a
prelude to an attack.
What would be most helpful to you in finding out if this is occurring?
A. Examining your antivirus logs
B. Examining your domain controller server logs
C. Examining your firewall logs
D. Examining your DNS Server logs
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Firewall logs will show all incoming and outgoing traffic. By examining those logs, you can do port
scans and use other penetration testing tools that have been used on your firewall.
NEW QUESTION: 26
Which of the following is an enterprise-grade network/application/performance monitoring
platform that tightly integrates with other smart building management systems, such as physical
access control, HVAC, lighting, and time/attendance control?
Answer:
B is incorrect. Andrisoft WANGuard Platform offers solutions for various network issues such as
WAN links monitoring, DDoS detection and mitigation, traffic accounting, and graphing.
NEW QUESTION: 27
You work as a Java Programmer for JavaSkills Inc. You are working with the Linux operating
system.
Nowadays, when you start your computer, you notice that your OS is taking more time to boot
than usual.
You discuss this with your Network Administrator. He suggests that you mail him your Linux
bootup report.
Which of the following commands will you use to create the Linux bootup report?
A. touch bootup_report.txt
B. dmesg > bootup_report.txt
C. dmesg | wc
D. man touch
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
According to the scenario, you can use dmesg > bootup_report.txt to create the bootup file. With
this command, the bootup messages will be displayed and will be redirected towards
bootup_report.txt using the > command.
NEW QUESTION: 28
eBox Platform is an open source unified network server (or a Unified Network Platform) for SMEs.
In which of the following forms can eBox Platform be used?
Answer:
D is incorrect. eBox Platform cannot act as a sandbox. A sandbox is a security mechanism for
separating running programs. It is often used to execute untested code, or untrusted programs,
from unverified third-parties, suppliers, and untrusted users.
NEW QUESTION: 29
HOTSPOT
You work as a Network Administrator for uCertify Inc. The company's Windows 2000-based
network is configured with Internet Security and Acceleration (ISA) Server 2000. All clients on the
network run Windows 2000 Professional. The company policy prevents you from installing the
Firewall Client software or configuring the Web Proxy service on any client computer. You
configure access policy rules to allow all the users to use the HTTP protocol for accessing all
Internet sites. However, users on the network report that they are unable to do so.
Mark the option that is configured incorrectly.
Hot Area:
Answer:
Explanation/Reference:
Explanation:
The company policy states that you cannot install the Firewall Client software or configure the
Web Proxy service on any client computer. Therefore, you will have to configure all client
computers as SecureNAT clients. The users are unable to access Internet Web sites because
you have enabled the Ask unauthenticated users for identification check box. SecureNAT clients
do not provide user name or computer name information to ISA Server when making requests.
Hence, all SecureNAT client requests are denied.
To resolve the issue, you will have to disable the Ask unauthenticated users for identification
check box.
NEW QUESTION: 30
NEW QUESTION: 31
Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company.
Sarah wants greater control over the appearance and presentation of Web pages. She wants the
ability to precisely specify the display attributes and the appearance of elements on the Web
pages.
How will she accomplish this?
A. Use the Database Design wizard.
B. Make two templates, one for the index page and the other for all other pages.
C. Use Cascading Style Sheet (CSS).
D. Make a template and use it to create each Web page.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Sarah should use the Cascading Style Sheet (CSS) while creating Web pages. This will give her
greater control over the appearance and presentation of the Web pages and will also enable her
to precisely specify the display attributes and the appearance of elements on the Web pages.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 32
Which of the following services are provided by the proxy servers?
A. Intrusion detection
B. Logging
C. Hiding network resources
D. Caching
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
A proxy server is a very important element for firewall applications. The services that it provides
are as follows:
Hide network resources: Proxy replaces the network IP address with a single IP address. Multiple
systems can use a single IP address.
Logging: A proxy server can log incoming and outgoing access, allowing a user to see every
possible details of successful and failed connections.
Cache: A proxy server can save information obtained from the Internet. It regularly updates these
copies and automatically shows these pages, and will thus not need to access the Internet to view
them.
NEW QUESTION: 33
Which of the following statements is NOT true about FAT16 file system?
Answer:
C, D are incorrect. All these statements are true about FAT16 file system.
NEW QUESTION: 34
Mark works as a project engineer in Tech Perfect Inc. His office is configured with Windows XP-
based computers. The computer that he uses is not configured with a default gateway. He is able
to access the Internet, but is not able to use e-mail services via the Internet. However, he is able
to access e-mail services via the intranet of the company.
Which of the following could be the reason of not being able to access e-mail services via the
Internet?
Answer:
C is incorrect. A router is a device that routes data packets between computers in different
networks. It is used to connect multiple networks, and it determines the path to be taken by each
data packet to its destination computer. A router maintains a routing table of the available routes
and their conditions. By using this information, along with distance and cost algorithms, the router
determines the best path to be taken by the data packets to the destination computer. A router
can connect dissimilar networks, such as Ethernet, FDDI, and Token Ring, and route data
packets among them. Routers operate at the network layer (layer 3) of the Open Systems
Interconnection (OSI) model.
NEW QUESTION: 35
You work as a Network Administrator for Infonet Inc. The company's network has an FTP server.
You want to secure the server so that only authorized users can access it.
What will you do to accomplish this?
Answer:
C is incorrect. Disabling the network adapter on the FTP server will disconnect the server from
the
network.
NEW QUESTION: 36
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is
based on Windows Server 2003. One day, while analyzing the network security, he receives an
error message that Kernel32.exe is encountering a problem. Which of the following steps should
John take as a countermeasure to this situation?
Answer:
A, B are incorrect. Since kernel.exe is not a real kernel file of Windows, there is no need to repair
or download any patch for Windows Server 2003 from the Microsoft site to repair the kernel. Note:
Such error messages can be received if the computer is infected with malware, such as
Worm_Badtrans.b, Backdoor.G_Door, Glacier Backdoor, Win32.Badtrans.29020, etc.
NEW QUESTION: 37
You work as a Network Administrator for Tech Perfect Inc. You have a laptop running Windows
Vista Ultimate. You want to configure Windows Defender on your laptop so that it does not take
any action automatically whenever it scans malicious software. Rather, it should recommend the
action and wait for your approval for taking any action.
Which of the following actions will you take to accomplish the task?
A. Clear the Use real-time protection check box in Defender Options
B. Clear the Automatically scan my computer check box in Defender Options
C. Select the Create a restore point before applying action to detected items check box in
Defender Options
D. Clear the Apply default actions to items detected during a scan check box in Defender Options.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
According to the question, you want to prevent Windows Defender from taking any action
automatically during the scanning of your laptop. In order to accomplish this, you will have to clear
the Apply default actions to items detected during a scan check box in Defender Options.
If you clear the Applydefault actions to items detected during a scan check box, it will result in
Windows Defender only recommending an action to take for detected malicious software.
NEW QUESTION: 38
The SALES folder has a file named XFILE.DOC that contains critical information about your
company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks
you to provide security for that file. You make a backup of that file and keep it in a locked
cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales
group, accidentally deletes that file. You have verified that John is not a member of any other
group. Although you restore the file from backup, you are confused how John was able to delete
the file despite having no access to that file. What is the most likely cause?
Answer:
B, D are incorrect. The Deny Access permission works on files.
NEW QUESTION: 39
Which of the following methods is used to get a cookie from a client?
Note: Here, request is a reference of type HttpServletRequest, and response is a reference of
type HttpServletResponse.
Answer:
D is incorrect. The getCookies() method is present in the HttpServletRequest interface and not in
the HttpServletResponse interface.
NEW QUESTION: 40
A. It is a duplicate of the original site of the organization, with full computer systems as well as
near- complete backups of user data.
B. It is the most inexpensive backup site.
C. It can be used within an hour for data recovery.
D. It is cheaper than a coldsite but more expensive than a worm site.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
A hot site is a duplicate of the original site of the organization, with full computer systems as well
as near- complete backups of user data. A hot site can be used within an hour for data recovery.
The capacity of the hot site may or may not match the capacity of the original site depending on
the organization's requirements. This type of backup site is the most expensive to operate. Hot
sites are popular with organizations that operate real time processes such as financial institutions,
government agencies, and ecommerce providers. the original site. A cold site is the most
inexpensive type of backup site for an organization to operate since it does not include backed up
copies of data and information from the original location of the organization, nor does it include
hardware already set up. A warm site is, quite logically, a compromise between hot and cold in
terms of resources and cost.
NEW QUESTION: 41
You work as a Network Administrator for XYZ CORP. The company has a Windows-based
network. You want to configure the ACL with a Cisco router.
Which of the following router prompts can you use to accomplish the task?
A. router(config-if)#
B. router(config)#
C. router(config-ext-nacl)#
D. router#
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The auditor of a Cisco router should be familiar with the variety of privilege modes. The current
privilege mode can be quickly identified by looking at the current router prompt. The prime modes
of a Cisco router are as follows:
#Nonprivileged mode: router>
#Priviledged mode: router#
#Global configuration mode: router(config)#
#Interface configuration mode: router(config-if)#
#ACL configuration mode: router(config-ext-nacl)#
#Boot loader mode: router(boot)
#Remote connectivity config mode: router(config-line)#
NEW QUESTION: 42
Mark implements a Cisco unified wireless network for Tech Perfect Inc. Which functional area of
the Cisco unified wireless network architecture includes intrusion detection and prevention?
Answer:
D is incorrect. A wireless access point (WAP) is a device that allows wireless communication
devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards. The WAP
usually connects to a wired network, and it can transmit data between wireless devices and wired
devices on the network. Each access point can serve multiple users within a defined network
area. As people move beyond the range of one access point, they are automatically handed over
to the next one. A small WLAN requires a single access point. The number of access points in a
network depends on the number of network users and the physical size of the network.
NEW QUESTION: 43
You work as an IT Technician for XYZ CORP. You have to take security measures for the
wireless network of the company. You want to prevent other computers from accessing the
company's wireless network.
On the basis of the hardware address, which of the following will you use as the best possible
method to accomplish the task?
A. RAS
B. MAC Filtering
C. SSID
D. WEP
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
MAC filtering is a security access control technique that allows specific network devices to
access, or prevents them from accessing, the network. MAC filtering can also be used on a
wireless network to prevent certain network devices from accessing the wireless network. MAC
addresses are allocated only to hardware devices, not to persons.
NEW QUESTION: 44
Pervasive IS controls can be used across all the internal departments and external contractors to
define the direction and behavior required for the technology to function properly.
When these controls are implemented properly, which of the following areas show the reliability
improvement? (Choose three)
Answer:
A is incorrect. Pervasive IS controls do not have any relation with the reliability of the hardware
development.
NEW QUESTION: 45
You work as a Software Developer for UcTech Inc. You want to create a new session.
Which of the following methods can you use to accomplish the task?
A. getNewSession(true)
B. getSession(false)
C. getSession()
D. getSession(true)
E. getNewSession()
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The getSession() method of the HttpServletRequest interface returns the current session
associated with the request, or creates a new session if no session exists. The method has two
syntaxes as follows:
public HttpSession getSession(): This method creates a new session if it does not exist.
public HttpSession getSession(boolean create): This method becomes similar to the above
method if
create is true, and returns the current session if create is false. It returns null if no session exists.
B is incorrect. The getSession(false) method returns a pre-existing session. It returns null if the
client has no session associated with it.
NEW QUESTION: 46
Which of the following terms related to risk management represents the estimated frequency at
which a threat is expected to occur?
Answer:
D is incorrect. Safeguard acts as a countermeasure for reducing the risk associated with a
specific threat or a group of threats.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 47
Which of the following statements about a screened host is true?
Answer:
A is incorrect. A proxy server facilitates a more efficient use of the Internet connection bandwidth
and hides the real IP addresses of computers located behind the proxy.
NEW QUESTION: 48
You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based
network. The network has a vast majority of Cisco Systems routers and Cisco network switches.
You want to take a snapshot of the router running configuration and archive running configuration
of the router to persistent storage.
Which of the following steps will you take?
Answer:
B is incorrect. By restoring an archived primary bootset, you can restore a primary bootset from a
secure archive after an NVRAM has been erased or a disk has been formatted.
NEW QUESTION: 49
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-
based network. John is working as a root user on the Linux operating system. You want to run
two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has
executed successfully.
Which of the following command sequences will John use to accomplish the task?
Answer:
C is incorrect. In the foo | bar; command sequence, the output of the foo command will be the
input for the bar command.
NEW QUESTION: 50
NEW QUESTION: 51
You are responsible for a large network that has its own DNS servers. You periodically check the
log to see if there are any problems.
Which of the following are likely errors you might encounter in the log? (Choose three)
Answer:
A is incorrect. DNS Servers do not create SMTP connections.
NEW QUESTION: 52
You have been assigned a project to develop a Web site for a construction company. You plan to
develop a Web site and want to use cascading style sheets (CSS) as it helps you to get more
control over the appearance and presentation of your Web pages and also extends your ability to
precisely specify the position and appearance of the elements on a page and create special
effects. You want to define styles for individual elements of a page.
Which type of style sheet will you use?
A. Embedded Style Sheet
B. Internal Style Sheet
C. External Style Sheet
D. Inline Style Sheet
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Cascading style sheets (CSS) are used so that the Web site authors can exercise greater control
on the appearance and presentation of their Web pages. And also because they increase the
ability to precisely point to the location and look of elements on a Web page and help in creating
special effects. Cascading Style Sheets have codes, which are interpreted and applied by the
browser on to the Web pages and their elements. There are three types of cascading style
sheets.
External Style Sheets
Embedded Style Sheets
Inline Style Sheets
External Style Sheets are used whenever consistency in style is required throughout a Web site.
A typical external style sheet uses a .css file extension, which can be edited using a text editor
such as a Notepad.
Embedded Style Sheets are used for defining styles for an active page.
Inline Style Sheets are used for defining individual elements of a page.
Reference: TechNet, Contents: Microsoft Knowledgebase, February 2000 issue PSS ID Number:
Q179628
NEW QUESTION: 53
Which of the following commands can be used to format text files?
A. wc
B. ps
C. tail
D. pr
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The pr command is used to format text files according to the specified options. This command is
usually used to paginate or columnate files for printing.
Answer B is incorrect. The ps command reports the status of processes that are currently running
on a
Linux computer.
Answer A is incorrect. The wc command is used to count the number of bytes, words, and lines in
a given
file or in the list of files.
Answer C is incorrect. The tail command is used to display the last few lines of a text file or piped
data.
NEW QUESTION: 54
You want to change the number of characters displaying on the screen while reading a txt file.
However, you do not want to change the format of the txt file.
Which of the following commands can be used to view (but not modify) the contents of the text file
on the terminal screen at a time?
Answer:
B is incorrect. The tail command is used to display the last few lines of a text file or piped data.
NEW QUESTION: 55
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from
the company for personal reasons. He wants to send out some secret information of the
company. To do so, he takes an image file and simply uses a tool image hide and embeds the
secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo
mail id. Since he is using the image file to send the data, the mail server of his company is unable
to filter this mail.
Which of the following techniques is he performing to accomplish his task?
Answer:
C is incorrect. John is not performing email spoofing. In email spoofing, an attacker sends emails
after writing another person's mailing address in the from field of the emailed.
NEW QUESTION: 56
DRAG DROP
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based
network environment. The network has two switches and a router as shown in the image below:
The router connects the network to the Internet. For security, you want to disable CDP for the
interface connected to the Internet. However, you do not want to disable this information for the
internal network.
Select the command (or series of commands) that you will issue to accomplish this task.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
In order to accomplish this task, you will have to issue the following commands:
interface s0/0
no cdp enable
According to the question, you are required to disable CDP only on the interface that is connected
to the Internet. For this, you will have to run the no cdp enable command on the interface. To
select the interface, the interface <interface id> command is issued. This will disable CDPonly on
the interface selected.
The no cdp run command is a global command and is used to disable CDP for the entire switch.
NEW QUESTION: 57
An executive in your company reports odd behavior on her PDA. After investigation you discover
that a trusted device is actually copying data off the PDA. The executive tells you that the
behavior started shortly after accepting an e-business card from an unknown person.
What type of attack is this?
A. Session Hijacking
B. Bluesnarfing
C. Privilege Escalation
D. PDA Hijacking
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Bluesnarfing is a rare attack in which an attacker takes control of a bluetooth enabled device. One
way to do this is to get your PDA to accept the attacker's device as a trusted device.
NEW QUESTION: 58
You are concerned about rogue wireless access points being connected to your network.
What is the best way to detect and prevent these?
Answer:
C is incorrect. A protocol analyzer will help you analyze the specific traffic on a given node, but
won't be much help in directly detecting rogue access points.
NEW QUESTION: 59
DRAG DROP
Drag and Drop the layers of TCP/IP model according to their level of data encapsulation.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
In the above diagram, the raw data is available in the Application layer of the TCP/IP model. The
data coded according to the Application layer protocols is encapsulated into one or more
transport layer protocols, which finally used by the lower layer protocols to affect the actual data
transfer.
In the Transport layer, the data is combined with the UDP header. The responsibilities of the
Transport Layer include end-to-end message transfer capabilities independent of the underlying
network, along with error control, segmentation, flow control, congestion control, and application
addressing (port numbers).
In the Internet layer, the data and UDP header are combined to form an IP data, which is
navigated by the IP header across the Internet for its exact destination.
In the Link layer, the IP data and IP header combine to form the final frame data, which is
accompanied by the Frame header and Frame Footer. The Link Layer is used to move packets
between the Internet Layer interfaces of two different hosts on the same link. Main function of the
Link layer is to add a packet header to prepare it for transmission and then actually transmit the
frame over a physical medium.
NEW QUESTION: 60
Answer:
D is incorrect. NetStumbler is a Windows-based tool that is used for the detection of wireless
LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. It detects wireless networks and
marks their relative position with a GPS.
NEW QUESTION: 61
Which of the following types of authentication tokens forms a logical connection to the client
computer but does not require a physical connection?
Answer:
C is incorrect. Disconnected tokens have neither a physical nor logical connection to the client
computer. They typically do not require a special input device, and instead use a built-in screen to
display the generated authentication data, which the user enters manually via a keyboard or
keypad.
Disconnected tokens are the most common type of security token used (usually in combination
with a password) in two-factor authentication for online identification.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 62
Which of the following are attributes of the <TABLE> tag? (Choose three)
A. BORDER
B. ALIGN
C. TD
D. WIDTH
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The WIDTH attribute of the <TABLE> tag is used to set the width of a table. Width can be
specified in pixels and percentage. For example, if a table of the same width as that of the parent
object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns
the table within the text flow.
By default alignment is set to left. The BORDER attribute of the <TABLE> tag is used to set the
width of the table border.
Answer C is incorrect. <TD> is not an attribute of the <TABLE> tag. It is a tag used to specify
cells in a table.
NEW QUESTION: 63
Web applications are accessed by communicating over TCP ports via an IP address. Choose the
two most common Web Application TCP ports and their respective protocol names. (Choose two)
A. TCP Port 443 / S-HTTP or SSL
B. TCP Port 80 / HTTPS or SSL
C. TCP Port 443 / HTTPS or SSL
D. TCP Port 80 / HTTP
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The two most common Web Application TCP ports are Port 443 and Port 80. HTTPS or SSL uses
TCP port 443, whereas HTTP uses TCP Port 80.
Answer B is incorrect. Port 80 is used for HTTP, not HTTPS.
Answer A is incorrect. S-HTTP is not the protocol name for Port 443. HTTPS or SSL is the name
used for
Port 443 traffic.
NEW QUESTION: 64
Which of the following processes is described in the statement below?
"This is the process of numerically analyzing the effect of identified risks on overall project
objectives."
Answer:
B is incorrect. This is the process of implementing risk response plans, tracking identified risks,
monitoring residual risk, identifying new risks, and evaluating risk process effectiveness through
the project.
NEW QUESTION: 65
Which of the following statements about the traceroute utility are true?
Answer:
C, D are incorrect. Traceroute does not perform polymorphic shell code attacks. Attacking tools
such as AD Mutate are used to perform polymorphic shell code attacks.
NEW QUESTION: 66
Peter works as a Web Developer for XYZ CORP. He is developing a Web site for the company. In
one of the Web pages, Peter wants to ensure that certain information is consistent and visible
while the other information changes.
Which of the following will he use to accomplish this?
Answer:
C is incorrect. Data elements are used to access data in XML format from a Web server.
NEW QUESTION: 67
DRAG DROP
You work as a Network Administrator for Blue Well Inc. The company has a TCP/IP-based
network environment. The network contains Cisco switches and a Cisco Catalyst router. The
network is configured as shown in the image below:
You want to enable Host A to access the Internet. For this, you need to configure the default
gateway settings. Choose the appropriate address to accomplish the task.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
According to the question, you are required to configure the default gateway setting on Host A so
that users can access the Internet through it. For a computer to communicate with computers on
another segment in a routed network, it is important to configure the default gateway. In order to
accomplish the task, you will have to set the address 192.168.19.203 as the default gateway
address.
NEW QUESTION: 68
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network.
You want to allow direct access to the filesystems data structure.
Which of the following Unix commands can you use to accomplish the task?
Answer:
C isincorrect. In Unix, the du command shows how much disk space a directory and all its files
contain.
NEW QUESTION: 69
John works as a professional Ethical Hacker. He is assigned a project to test the security of
www.we-are- secure.com. He is working on the Linux operating system. He wants to sniff the we-
are-secure network and intercept a conversation between two employees of the company through
session hijacking.
Which of the following tools will John use to accomplish the task?
Answer:
B is incorrect. Tripwire is a file and directory integrity checker.
NEW QUESTION: 70
Answer:
A is incorrect. IDS logs will only help you identify potential attacks. Unless you suspect the user of
intentionally trying to break into resources, an IDS log will not help in this scenario.
NEW QUESTION: 71
Which of the following commands will you use to watch a log file /var/adm/messages while the log
file is updating continuously?
Answer:
A is incorrect. The less command is used to view (but not change) the contents of a text file, one
screen at a time. It is similar to the more command. However, it has the extended capability of
allowing both forward and backward navigation through the file. Unlike most Unix text
editors/viewers, less does not need to read the entire file before starting; therefore, it has faster
load times with large files.
The command syntax of the less command is as follows:
less [options] file_name Where,
NEW QUESTION: 72
Patricia joins XYZ CORP., as a Web Developer. While reviewing the company's Web site, she
finds that many words including keywords are misspelled.
How will this affect the Web site traffic?
A. Leave a bad impression on users.
B. Search engine relevancy may be altered.
C. Link exchange with other sites becomes difficult.
D. The domain name cannot be registered.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Web site traffic depends upon the number of users who are able to locate a Web site. Search
engines are one of the most frequently used tools to locate Web sites. They perform searches on
the basis of keywords contained in the Web pages of a Web site. Keywords are simple text
strings that are associated with one or more topics of a Web page. Misspelled keywords prevent
Web pages from being displayed in the search results.
NEW QUESTION: 73
What does a firewall check to prevent certain ports and applications from getting the packets into
an Enterprise?
Answer:
A, C, D are incorrect. This information is not checked by a firewall.
NEW QUESTION: 74
Which of the following are the countermeasures against WEP cracking?
Answer:
D is incorrect. SSID stands for Service Set Identifier. It is used to identify a wireless network.
SSIDs are case sensitive text strings and have a maximum length of 32 characters. All wireless
devices on a wireless network must have the same SSID in order to communicate with each
other. The SSID on computers and the devices in WLAN can be set manually and automatically.
Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks
will create a conflict. A network administrator often uses a public SSID that is set on the access
point. The access point broadcasts SSID to all wireless devices within its range. Some newer
wireless access points have the ability to disable the automatic SSID broadcast feature in order to
improve network security.
NEW QUESTION: 75
From an auditing perspective, database security can be broken down into four key categories:
Server Security
Database Connections
Table Access Control
Restricting Database Access.
Which of the following categories leads to the process of limiting access to the database server?
Answer:
C is incorrect. Restricting database access is important especially for the companies that have
their databases uploaded on the Internet. Internet-based databases have been the most recent
targets of attacks, due to their open access or open ports. It is very easy for criminals to conduct
a "port scan" to look for ports that are open that popular database systems are using by default.
The ports that are used by default can be changed, thus throwing off a criminal looking for open
ports set by default.
Following are the security measures that can be implemented to prevent open access from the
Internet:
Trusted IP addresses: Servers can be configured to answer pings from a list of trusted hosts only.
Server account disabling: The server ID can be suspended after three password attempts.
Special tools: Products can be used to send an alert when an external server is attempting to
breach the system's security. One such example is Real Secure by ISS.
NEW QUESTION: 76
TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote
device during standard layer 4 network communications. The combination of parameters may
then be used to infer the remote operating system (OS fingerprinting), or incorporated into a
device fingerprint.
Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?
Answer:
D is incorrect. The nmap -sT switch is used to perform a TCP full scan.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 77
In an IT organization, some specific tasks require additional detailed controls to ensure that the
workers perform their job correctly.
What do these detailed controls specify? (Choose three)
Answer:
C is incorrect. Input data should be verified before being accepted into an application.
NEW QUESTION: 78
In which of the following social engineering attacks does an attacker first damage any part of the
target's equipment and then advertise himself as an authorized person who can help fix the
problem.
Answer:
B, C, D are incorrect. Person-to-Person social engineering works on the personal level. It can be
classified as follows:
Impersonation: In the impersonation social engineering attack, an attacker pretends to be
someone else, for example, the employee's friend, a repairman, or a delivery person.
In Person Attack: In this attack, the attacker just visits the organization and collects information.
To accomplish such an attack, the attacker can call a victim on the phone, or might simply walk
into an office and pretend to be a client or a new worker.
Important User Posing: In this attack, the attacker pretends to be an important member of the
organization.
This attack works because there is a common belief that it is not good to question authority.
Third-Party Authorization: In this attack, the attacker tries to make the victim believe that he has
the approval of a third party. This works because people believe that most people are good and
they are being truthful about what they are saying.
NEW QUESTION: 79
You work as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its
database. You have used the LogMiner feature for auditing purposes.
Which of the following files store a copy of the data dictionary? (Choose two)
A. Online redo log files
B. Operating system flat file
C. Dump file
D. Control file
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
LogMiner requires a dictionary to translate object IDs into object names when it returns redo data
to you.
You have the following three options to retrieve the data dictionary:
The Online catalog: It is the most easy and efficient option to be used. It is used when a database
user have access to the source database from which the redo log files were created. The other
condition that should qualify is that there should be no changes to the column definitions in the
desired tables.
The Redo Log Files: This option is used when a database user does not have access to the
source database from which the redo log files were created and if there are any chances of
changes to the column definitions of the desired tables.
An operating system flat file: Oracle does not recommend to use this option, but it is retained for
backward compatibility. The reason for not preferring the option is that it does not guarantee
transactional consistency. LogMiner is capable to access the Oracle redo logs. It keeps the
complete record of all the activities performed on the database, and the associated data
dictionary, which is used to translate internal object identifiers and types to external names and
data formats. For offline analysis, LogMiner can be run on a separate database, using archived
redo logs and the associated dictionary from the source database.
NEW QUESTION: 80
A. There will be no effect on the session; it will last for its default time.
B. The session will never expire.
C. An error will occur during execution.
D. The session will expire immediately.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The <session-timeout> element of the deployment descriptor sets the session timeout. If the time
specified for timeout is zero or negative, the session will never timeout.
NEW QUESTION: 81
The Security Auditor's Research Assistant (SARA) is a third generation network security analysis
tool.
Which of the following statements are true about SARA? (Choose two)
Answer:
B is incorrect. SARA can be used to perform exhaustive XSS tests.
NEW QUESTION: 82
John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian
Linux-based network. He is working on the bash shell in which he creates a variable VAR1. After
some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental
variable so that he can retrieve VAR1 into the ksh shell.
Which of the following commands will John run to accomplish the task?
A. echo $VAR1
B. touch VAR1
C. export VAR1
D. env -u VAR1
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Since John wants to use the variable VAR1 as an environmental variable, he will use the export
command to accomplish the task.
NEW QUESTION: 83
You work as the Network Administrator for XYZ CORP. The company has a Linux-based network.
You are a root user on the Red Hat operating system. You want to see first five lines of the
file /etc/passwd.
Which of the following commands should you use to accomplish the task?
A. head -n 5 /etc/passwd
B. head 5 -n /etc/passwd
C. tail -n 5 /etc/passwd
D. head /etc/passwd
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The head -n 5 /etc/passwd command will show the first 5 lines of the file /etc/passwd.
NEW QUESTION: 84
You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network
environment. The network contains Cisco switches and a Cisco router.
You run the following command for a router interface:
show interface serial0
You get the following output:
Serial0 is administratively down, line protocol is down
What will be your conclusion after viewing this output?
Answer:
C is incorrect. Encapsulation has nothing to do with the output displayed in the question.
NEW QUESTION: 85
You have been assigned a project to develop a Web site for a construction company. You plan to
develop a Web site and want to get more control over the appearance and presentation of the
Web pages. You also want to increase your ability to precisely specify the position and
appearance of the elements on a page and create special effects. You plan to use cascading
style sheets (CSS). You want to define styles only for the active page.
Which type of style sheet will you use?
A. Embedded Style Sheet
B. Inline Style Sheet
C. Internal Style Sheet
D. External Style Sheet
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
To define styles only for the active page you should use embedded style sheet. Cascading style
sheets (CSS) are used so that the Website authors can exercise greater control on the
appearance and presentation of their Web pages. And also because they increase the ability to
precisely point to the location and look of elements on a Web page and help in creating special
effects. Cascading Style Sheets have codes, which are interpreted applied by the browser on to
the Web pages and their elements. There are three types of cascading style sheets. External
Style Sheets Embedded Style Sheets Inline Style Sheets External Style Sheets are used
whenever consistency in style is required throughout a Web site. A typical external style sheet
uses a .css file extension, which can be edited using a text editor such as a Notepad. Embedded
Style Sheets are used for defining styles for an active page. Inline Style Sheets are used for
defining individual elements of a page.
Reference: TechNet, Contents: Microsoft Knowledgebase, February 2000 issue PSS ID Number:
Q179628 You want to enable Host A to access the Internet. For this, you need to configure the
default gateway settings. Choose the appropriate address to accomplish the task.
NEW QUESTION: 86
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a
wireless sniffer to sniff the We-are-secure network.
Which of the following tools will he use to accomplish his task?
Answer:
C is incorrect. Snadboy's Revelation is not a sniffer. It is used to see the actual password behind
the asterisks.
NEW QUESTION: 87
You work as the Network Technician for XYZ CORP. The company has a Linux-based network.
You are working on the Red Hat operating system. You want to view only the last 4 lines of a file
named /var/log/ cron.
Which of the following commands should you use to accomplish the task?
A. tail -n 4 /var/log/cron
B. tail /var/log/cron
C. cat /var/log/cron
D. head /var/log/cron
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The tail -n 4 /var/log/cron command will show the last four lines of the file /var/log/cron.
NEW QUESTION: 88
You work as a Web Deployer for UcTech Inc. You write the <security constraint> element for an
application in which you write the <auth-constraint> sub-element as follows: <auth-constraint>
<role- name>*</role-name> </auth-constraint> Who will have access to the application?
A. Only the administrator
B. No user
C. All users
D. It depends on the application.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The <auth-constraint> element is a sub-element of the <security-constraint> element. It defines
the roles that are allowed to access the Web resources specified by the <web-resource-
collection> sub-elements.
The <auth-constraint> element is written in the deployment descriptor as follows:
<security-constraint> <web-resource-collection> ---------------- </web-resource-collection> <auth-
constraint> <role-name>Administrator</role-name> </auth-constraint> </security-constraint>
Writing Administrator within the <role-name> element will allow only the administrator to have
access to the resource defined within the <web-resource-collection> element.
NEW QUESTION: 89
You are the Security Administrator for an Internet Service Provider. From time to time your
company gets subpoenas from attorneys and law enforcement for records of customers' access
to the internet. What policies must you have in place to be prepared for such requests?
Answer:
A is incorrect. Group policies are usually pertinent to network administration, not the open and
uncontrolled environment of an ISP.
Answer B is incorrect. Backup policies dictate how data is backed up and stored.
NEW QUESTION: 90
Answer:
A, D are incorrect. These rule sets are used for outgoing traffic, i.e., traffic going from the intranet
to the Internet as the 'Output chain' rule is being used.
NEW QUESTION: 91
Which of the following statements is true about residual risks?
Answer:
C is incorrect. Vulnerability is a weakness or lack of safeguard that can be exploited by a threat,
thus causing harm to the information systems or networks. It can exist in hardware, operating
systems, firmware, applications, and configuration files. Vulnerability has been variously defined
in the current context as follows:
1.A security weakness in a Target of Evaluation due to failures in analysis, design,
implementation, or operation and such.
2.Weakness in an information system or components (e.g. system security procedures, hardware
design, or internal controls that could be exploited to produce an information-related misfortune.)
3. The existence of a weakness, design, or implementation error that can lead to an unexpected,
undesirable event compromising the security of the system, network, application, or protocol
involved.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 92
You work as a Network Administrator for Net World International. The company has a Windows
Active Directory-based single domain single forest network. The functional level of the forest is
Windows Server
2003. There are ten Sales Managers in the company. The company has recently provided laptops
to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be
connected to the company's network through wireless connections. The company's management
wants to implement Shared Key authentication for these laptops. When you try to configure the
network interface card of one of the laptops for Shared Key authentication, you find no such
option. What will you do to enable Shared Key authentication?
A. Install PEAP-MS-CHAP v2
B. Enable WEP
C. Install Service Pack 1
D. Install EAP-TLS.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Shared Key authentication requires the use of the Wired Equivalent Privacy (WEP) algorithm. If
the WEP is not implemented, then the option for Shared Key authentication is not available. In
order to accomplish the task, you will have to enable the WEP on all the laptops.
NEW QUESTION: 93
You have made a program secure.c to display which ports are open and what types of services
are running on these ports. You want to write the program's output to standard output and
simultaneously copy it into a specified file.
Which of the following commands will you use to accomplish the task?
Answer:
C is incorrect. The less command is used to view (but not change) the contents of a text file, one
screen at a time. It is similar to the more command. However, it has the extended capability of
allowing both forward and backward navigation through the file. Unlike most Unix text
editors/viewers, less does not need to read the entire file before starting; therefore, it has faster
load times with large files. The command syntax of the less command is as follows: less [options]
file_name Where,
Answer B is incorrect. The more command is used to view (but not modify) the contents of a text
file on the terminal screen at a time. The syntax of the more command is as follows: more
[options] file_name Where,
NEW QUESTION: 94
Which of the following statements is true about COLSPAN attribute?
A. COLSPAN is used to create columns in a table.
B. COLSPAN is used to divide one column into many columns.
C. COLSPAN is used to span one column across many rows.
D. COLSPAN is used to span one column across many columns.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
COLSPAN attribute is used to span one column across many columns. COLSPAN is an attribute
of <TD> and <TH> tags that allow a singlecolumn in a table to take space that is occupied by
several columns. If the specified COLSPAN value is greater than the number of columns in the
table, then a new column is created at the end of the row.
Reference: MSDN, Contents: COLSPAN
NEW QUESTION: 95
DRAG DROP
You have designed a TCP/IP based routed network. Diagram of the network is given below:
You are configuring IS-IS protocol as an IP routing protocol in the given network. Drag and drop
the appropriate commands beside their respective command prompts which you are using at
router C.
Select and Place:
Answer:
Explanation/Reference:
Explanation:
The commands that are configured on router C are as follows:
Router C(config)#router isis
Router C(config)#net 49.0001.0000.0000.000c.00
RouterC(config)#interface ethernet 1
Router C(config-if)#ip router isis
Router C(config-if)#exit
Router C(config)#interface ethernet 2
Router C(config-if)#ip router isis
NEW QUESTION: 96
Mark is an attacker. He wants to discover wireless LANs by listening to beacons or sending probe
requests and thereby provide a launch point for further attacks.
Which of the following tools can he use to accomplish the task?
Answer:
B is incorrect. Wellenreiter is a tool that is used to perform MAC spoofing attacks.
NEW QUESTION: 97
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network.
You want to set the user login features on the systems with the shadow passwords.
Which of the following Unix configuration files can you use to accomplish the task?
Answer:
D is incorrect. In Unix, the /etc/filesystems file is used to set the filesystem probe order when
filesystems are mounted with the auto option.
NEW QUESTION: 98
Which of the following encryption encoding techniques is used in the basic authentication
method?
Answer:
C is incorrect. DES (ECB mode) is used in the NTLMv1 authentication method.
NEW QUESTION: 99
The tool works under Windows 9x/2000. Which of the following tools can be used to automate the
MITM attack?
Answer:
B is incorrect. Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection
system. It can work with any wireless card that supports raw monitoring (rfmon) mode. Kismet
can sniff
802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet can be used for the following tasks:
To identify networks by passively collecting packets
To detect standard named networks
To detect masked networks
To collect the presence of non-beaconing networks via data traffic
Answer:
B is incorrect. Correcting all risk issues does not come under auditing processes.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Explanation/Reference:
Explanation:
The steps to display the status of Windows Firewall are as follows:
1.Click the Start button, then click Control Panel.
4.The Windows Firewall dialog box appears, displaying the status of Windows Firewall.
NEW QUESTION: 111
You have just set up a wireless network for customers at a coffee shop. Which of the following
are good security measures to implement? (Choose two)
A. Using WPA encryption
B. MAC filtering the router
C. Not broadcasting SSID
D. Using WEP encryption
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
With either encryption method (WEP or WPA) you can give the password to customers who need
it, and even change it frequently (daily if you like). So this won't be an inconvenience for
customers.
Answer:
Explanation/Reference:
Explanation:
Less is a program in Unix that allows backward as well as forward movement in the file. The
syntax of the less command is as follows:
less [options] file_name
Answer:
Explanation/Reference:
Explanation:
John will click on the Security Center icon to view the malware status.
Malware is a combination of the terms malicious and software. It refers to a variety of hostile
programs, such as a virus or a Trojan horse, designed to damage or disrupt a computer. It
gathers information about a computer without the user's permission or knowledge.
The Windows Update icon is used to manually update Windows Vista and configure the settings
for the update.
The Power Options icon is used configure the settings for various power plans.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
B is incorrect. In Unix, the /etc/motd file automatically displays the message of the day after a
successful login.
Answer:
Explanation/Reference:
Explanation:
Following are the basic file editing and viewing commands in Unix:
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Explanation/Reference:
Explanation:
An access router is the common name of the exterior router present in the screened host firewall
architecture. It is attached to the perimeter network and the Internet. An access router is used to
protect both the perimeter network and the internal network from the Internet. It allows anything
that is outbound from the perimeter network. Access routers seldom do packet filtering. The rules
for packet filtering regarding the protection of internal machines are always the same on both the
interior router and the exterior router.
A Screened Host Firewall Architecture is used to provide services from a host that is attached
only to the internal network by using a separate router. In this type of firewall architecture, the key
security is provided by packet filtering.
The host exists in the internal network. The packet filtering on the screening router is configured
in such a way that the bastion host is the only system in the internal network that is open to the
Internet connections.
If any external system tries to access internal systems or services, then it will connect only to this
host. The bastion host therefore needs to be at a high level of security.
Answer:
B is incorrect. A warm site is, quite logically, a compromise between hot and cold. These sites will
have hardware and connectivity already established, though on a smaller scale than the original
production site or even a hot site. Warm sites will have backups on hand, but they may not be
complete and may be between several days and a week old. An example would be backup tapes
sent to the warm site by courier.
NEW QUESTION: 141
You work as the Network Administrator for a company. You configure a Windows 2000-based
computer as the Routing and Remote Access server, so that users can access the company's
network, remotely. You want to log a record of all the users who access the network by using
Routing and Remote Access.
What will you do to log all the logon activities?
A. On the Routing and Remote Access server, enable log authentication requests in auditing, and
define the path for the log file in Remote Access Logging.
B. On the Routing and Remote Access server, enable log authentication requests in Remote
Access Logging.
C. On the Routing and Remote Access server, enable log authentication requests in auditing.
D. Do nothing as the Windows 2000-based Routing and Remote Access server automatically
creates a log record for each connection attempt.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
The Routing and Remote Access service can log all the records of authentication and accounting
information for connection attempts when Windows authentication or accounting is enabled. This
can be done by enabling the log authentication requests in the properties of the RemoteAccess
Logging folder, in the Routing and Remote Access snap-in, where you can configure the type of
activity to log, i.e., accounting or authentication activity and log file settings. This information is
stored in the form of a log file in '%SystemRoot%System32LogFiles' folder. For each
authentication attempt, the name of the remote access policy, that either accepted or rejected the
connection attempt, is recorded. The logged information is useful to track remote access usage,
and authentication attempts.
Explanation/Reference:
Explanation:
George will click on the Allow a program through Windows Firewall link to open the Windows
Firewall Settings dialog box. He will then insert a check mark in the File and Printer Sharing
checkbox in the Exceptions tab of the Windows Firewall Settings dialog box.
Answer:
Explanation/Reference:
Explanation:
In order to accomplish the task, you will have to configure the routers at all locations to use IPSec
in tunnel mode. Tunnel mode protects the WAN traffic. If you configure IPSec on routers, no
security for the WAN communication is required on other servers and workstations.
Answer:
B is incorrect. Nimda is a mass mailing virus that spreads itself in attachments named
README.EXE. It affects Windows 95, 98, ME, NT4, and Windows 2000 users. Nimda uses the
Unicode exploit to infect IIS Web servers.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Explanation/Reference:
Explanation:
In order to ensure that the laptop users use smart cards for authentication, you will have to
configure IEEE
802.1X authentication using the EAP-TLS protocol on the network.
Answer C is incorrect. The vi editor is an interactive, cryptic, and screen-based text editor used to
create and edit a file. It operates in either Input mode or Command mode. In Input mode, the vi
editor accepts a keystroke as text and displays it on the screen, whereas in Command mode, it
interprets keystrokes as commands. As the vi editor is case sensitive, it interprets the same
character or characters as different commands, depending upon whether the user enters a
lowercase or uppercase character. When a user starts a new session with vi, he must put the
editor in Input mode by pressing the "I" key. If he is not able to see the entered text on the vi
editor's screen, it means that he has not put the editor in Insert mode. The user must change the
editor to Input mode before entering any text so that he can see the text he has entered.
Answer:
A is incorrect. It is not a valid command.
Explanation/Reference:
Explanation:
TheHttpSessionBindingEvent class extends the HttpSessionEvent class.
The HttpSessionBindingEvent class is used with the following listeners:
HttpSessionBindingListener: It notifies the attribute when it is bound or unbound from a session.
HttpSessionAttributeListener: It notifies the class when an attribute is bound, unbound, or
replaced in a session.
The session binds the object by a call to the HttpSession.setAttribute() method and unbinds the
object by a call to the HttpSession.removeAttribute() method.
HttpSessionEvent is a class that is used with the following listeners:
HttpSessionListener: It notifies the class when a session is created or destroyed.
HttpSessionActivationListener: It notifies the attributes when a session is activated orpassivated.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
C is incorrect. It deletes from the cursor till the end of the line.
Answer:
C is incorrect. A multidimensional database is frequently created using input from existing
relational databases.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
A is incorrect. A cross site scripting attack is one in which an attacker enters malicious data into a
Website. For example, the attacker posts a message that contains malicious code to any
newsgroup site.
When another user views this message, the browser interprets this code and executes it and, as
a result, the attacker is able to take control of the user's system. Cross site scripting attacks
require the execution of client-side languages such as JavaScript, Java,VBScript, ActiveX, Flash,
etc. within a user's Webenvironment. With the help of a cross site scripting attack, the attacker
can perform cookie stealing, sessions hijacking, etc.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 197
Which of the following is a basic feature of the Unix operating system? (Choose three)
A. It is highly portable across hardware.
B. All files can be individually protected using read, write, and execute permissions for the user,
group, and others.
C. It allows all the modules to be loaded into memory.
D. A user can execute multiple programs at the same time from a single terminal.
Answer: A,B,D (LEAVE A REPLY)
Explanation/Reference:
Explanation:
The basic features of Unix are as follows:
Multi-user: It supports more than one user to access the system simultaneously through a set of
terminals attached to a system.
Multi-tasking: A user can execute multiple programs at the same time from a single terminal.
Time sharing: The operating system shares CPU time among tasks.
Portability: It is highly portable across hardware.
Modularity: It allows only needed modules to be loaded into the memory.
File structure: It has an inverted tree like file structure, with files and directories created within the
file
structure.
Security: All files can be individually protected using read, write, and execute permissions for the
user,
group, and others.
Network support: It uses the TCP/IP protocol.
Advanced graphics: CAD-CAM applications perform the best in a Unix System with its varied
support
for graphics card.
A. None, adding a wireless access point is a common task and not a security risk.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. An unauthorized WAP is one way for hackers to get into a network.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Any unauthorized Wireless Access Point (WAP) is a serious security breach. Its configuration
might be very unsecure. For example, it might not use encryption or MAC filtering, thus allowing
anyone in range to get on the network.
Answer:
Explanation/Reference:
Explanation:
HTTP/HTTPS is used for transferring HTML pages over the network. Hence, you should allow it
for both the Internet and internal clients traffic.
The Remote Desktop Protocol (RDP) is used to connect to servers remotely. Allowing it for the
Internet traffic is definitely a security threat. Hence, you should deny this for the Internet traffic.
According to the case study, the administrators must use RDP to connect to the servers in the
perimeter network. Hence, you will have to allow it for the internal clients traffic.
Explanation/Reference:
Explanation:
Session timeout is an event that occurs when a session is invalidated if a user does not use the
session for a specified period of time. Session timeout can be set in the following two ways:
1.Setting timeout in deployment descriptor: This can be done by specifying timeout between the
<session- timeout> tags as follows:
<session-config>
<session-timeout> 10 </session-timeout>
<session-config>
This will set the time for session timeout to ten minutes.
2.Setting timeout programmatically: This will set the timeout for a specific session. The syntax for
setting the timeout programmatically is as follows:
session.setMaxInactiveInterval(10*60)
In this method, the timeout is specified in seconds. Hence, this will set the time for session
timeout to ten minutes.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Explanation/Reference:
Explanation:
A firewall is a set of related programs configured to protect private networks connected to the
Internet from intrusion. It is used to regulate the network traffic between different computer
networks. It permits or denies the transmission of a network packet to its destination based on a
set of rules. A firewall is often installed on a separate computer so that an incoming packet does
not get into the network directly.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
D is incorrect. The TOPMARGIN and LEFTMARGIN attributes are used in the <BODY> tag to
adjust the top and left margins of a Web page to be displayed in Internet Explorer. Specifying
TOPMARGIN="0" and LEFTMARGIN="0" within the <BODY> tag will create a borderless page
structure when viewed in Internet Explorer.
Answer C is incorrect. These attributes are used to adjust margins and not to delete text from
margins.
Answer:
B is incorrect. Obiwan is a Web password cracking tool that is used to perform brute force and
hybrid attacks. It is effective against HTTP connections for Web servers that allow unlimited failed
login attempts by the user. Obiwan uses wordlists as well as alphanumeric characters as possible
passwords.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
Explanation/Reference:
Explanation:
TCP/IP defines a large set of protocols that allow communication between various devices on a
network.
TCP/IP classifies the various protocols into different layers. Some of the common protocols are
listed in the table below:
Answer:
Explanation/Reference:
Explanation:
The user can then select a program and restore it.
Answer:
B is incorrect. Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/
IP protocol suite. It is responsible for the resolution of IP addresses to media access control
(MAC) addresses of a network interface card (NIC). The ARP cache is used to maintain a
correlation between a MAC address and its corresponding IP address. ARP provides the protocol
rules for making this correlation and providing address conversion in both directions. ARP is
limited to physical network systems that support broadcast packets.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
A. Parallel Simulation
B. Generalized Audit Software (GAS)
C. Test Data
D. Custom Audit Software (CAS)
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
CAATs (Computer Assisted Auditing Techniques) are used to test application controls as well as
perform substantive tests on sample items. Following are the types of CAATs:
Generalized Audit Software (GAS): It allows the auditor to perform tests on computer files and
databases.
Custom Audit Software (CAS): It is generally written by auditors for specific audit tasks. CAS is
necessary when the organization's computer system is not compatible with the auditor's GAS or
when the auditor wants to conduct some testing that may not be possible with the GAS.
Test Data: The auditor uses test data for testing the application controls in the client's computer
programs.
The auditor includes simulated valid and invalid test data, used to test the accuracy of the
computer system's operations. This technique can be used to check data validation controls and
error detection routines, processing logic controls, and arithmetic calculations, to name a few.
Parallel Simulation: The auditor must construct a computer simulation that mimics the client's
production programs.
Integrated TestFacility: The auditor enters test data along with actual data in a normal application
run.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Explanation/Reference:
Explanation:
In order to ensure that the laptop users use smart cards for authentication, you will have to
configure IEEE
802.1X authentication using the EAP-TLS protocol on the network.
Answer:
Explanation/Reference:
Explanation:
Following are the basic file editing and viewing commands in Unix:
Explanation/Reference:
Explanation:
An IP packet is a formatted unit of data carried by a packet mode computer network. A packet
consists of two kinds of data:
control information and user data (also known as payload). The control information provides data
the network needs to deliver the user data, for example: source and destination addresses, error
detection codes like checksums, and sequencing information. Typically, control information is
found in packet headers and trailers, with user data in between.
IP packets are composed of a header and payload. Every IP packet has a set of headers
containing certain information. The main information is as follows:
IP source address
IP destination address
Protocol (whether the packet is a TCP, UDP, or ICMP packet)
TCP or UDP source port
TCP or UDP destination port
ICMP message type
The structure of an IP packet is as follows:
NEW QUESTION: 284
You have an online video library. You want to upload a directory of movies. Since this process will
take several hours, you want to ensure that the process continues even after the terminal is shut
down or session is closed.
What will you do to accomplish the task?
Answer:
A is incorrect. The bg command cannot run the command or process after the terminal is shut
down or session is closed.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
A. Layer 2 switches allow for the creation of Virtual LANs providing options for further
segmentation and security.
B. Switches lower the number of collisions in the environment.
C. Switches create an environment best suited for half duplex communications. This improves
network performance and the amount of available bandwidth.
D. Layer 2 switches increase the number of broadcast domains in the environment.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
Switches differ from hubs in that they break up Collision Domains. Each port on a switch equals
one Collision Domain. Therefore, a switch will lower the number of collisions within the
infrastructure. Managed switches typically offer the ability to create Virtual LANs. Virtual LANs
allow the switch to create multiple LANs/network segments that are Virtual. This allows the switch
to create additional environments where needed.
Answer:
Explanation/Reference:
Explanation:
The modulation schemes and IEEE standards working with these modulation schemes are given
below:
Answer:
Explanation/Reference:
Explanation:
In order to accomplish the task, you will have to select the Allow unsecured communication with
non-IPSec
-aware computers check box.
By enabling this option, IPSec will allow unsecured communication, if necessary. Disabling the
option blocks communication with computers that cannot initiate IPSec, such as legacy systems.
This option should be disabled to secure computers connected to the Internet.
Answer:
D is incorrect. A hierarchical database is a database management system that implements the
hierarchical data model. A hierarchical database system organizes data in a family tree structure
such that each record has only one owner and the hierarchy is in a parent and child data
segment. This implies that the record can have repeated information in a child segment. The
best-known hierarchical DBMS is IMS.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
NEW QUESTION: 302
You work as a Security manager for Qualoxizz Inc. Your company has number of network
switches in the site network infrastructure. Which of the following actions will you perform to
ensure the security of the switches in your company?
Answer:
C is incorrect. Short timeout sessions should always be set to reduce the session period. If the
connections to a management port on a switch do not have a timeout period set or have a large
timeout period (greater than 9 minutes), then the connections will be more available for an
attacker to hijack them.
Explanation/Reference:
Explanation:
There are four major CLI access modes:
User: When a user accesses the command-line interface (CLI) of a Cisco switch IOS, the IOS
puts the user in user mode. The user mode allows the user to look around; it does not permit the
user to change or break any configuration. When the user enters a command, the switch
executes the command and displays the command result. A Limited set of commands is available
for use in the user mode. User mode is also called user EXEC mode. The prompt in this mode is
displayed as hostname > Enable: Privileged EXEC mode is an area from where more powerful
commands can be run while accessing CLI of a switch IOS. In this mode, more commands are
added to the set of commands available in user mode. Privileged EXEC mode is also known as
privileged mode or enable mode. For reaching privileged EXEC mode, the enable command is
required to be run from user mode. By default, a user cannot get into privileged EXEC mode
through SSH and Telnet sessions. The prompt changes from hostname > to hostname # when a
user moves to privileged EXEC mode from user mode.
Global configuration: Global configuration mode is an access mode of Cisco command-line
interface (CLI).
The configuration commands can be run in this mode only. Commands run in this mode update
the active configuration file as soon as the Enter key is pressed at the end of a command. The
config command is required to be run from the enable mode to switch to the global configuration
mode. The prompt changes to hostname (config)# from hostname# when access mode is
changed to global configuration mode from enable mode.
Interface configuration: Interface configuration mode is a subcommand mode of the global
configuration access mode of Cisco command-line interface (CLI). The interface command is
used to move from global configuration mode to the interface configuration mode. The prompt
changes to hostname (config-if)# from hostname (config)# when a user moves from global
configuration mode to interface configuration mode.
After entering the interface configuration mode, the commands executed affects only the interface
that the user has selected. For example, the interface FastEthernet 0/1 command will put a user
in the interface configuration mode.
Commands executed afterwards will affect only the FastEthernet 0/1.
Explanation/Reference:
Explanation:
A firewall is a set of related programs configured to protect private networks connected to the
Internet from intrusion. It is used to regulate the network traffic between different computer
networks. It permits or denies the transmission of a network packet to its destination based on a
set of rules. A firewall is often installed on a separate computer so that an incoming packet does
not get into the network directly.
Employees are required to use Microsoft Outlook Web Access to access their emails remotely.
You are required to accomplish the following goals: Ensure fault tolerance amongst the servers.
Ensure the highest level of security and encryption for the Outlook Web Access clients. What will
you do to accomplish these goals?
A. Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access
on the existing server. Place the new server on the perimeter network. Configure unique URLs for
each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the
servers.
B. Install two front-end Exchange 2000 servers. Place the new servers on the internal network
and configure load balancing between them. Configure Certificate Services. Create a rule on the
firewall to redirect port 443 to the servers.
C. Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network
and configure load balancing between them. Configure Certificate Services. Create a rule on the
firewall to redirect port 443 to the servers.
D. Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure
unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct
port 443 to the servers.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
To ensure fault tolerance among the servers and to get the highest possible level of security and
encryption for OWA clients, you must install two front-end Exchange 2000 servers. Place the new
servers on the perimeter network and configure load balancing between them. To enhance
security, you should also configure Certificate Services and create a rule on the firewall to redirect
port 443 to the servers. The most secure firewall configuration is placing a firewall on either side
of the front-end servers. This isolates the front-end servers in a perimeter network, commonly
referred to as a demilitarized zone (DMZ). It is always better to configure more than one front-end
server to get fault tolerance.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
B, C, D are incorrect. These statements are true about the Basic Authentication scheme.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
Explanation/Reference:
Explanation:
The auditor must plan and conduct the audit to ensure their audit risk (the risk of reaching an
incorrect conclusion based on the audit findings) will be limited to an acceptable level. To
eliminate the possibility of assessing audit risk too low, the auditor should perform the following
steps:
Obtain an Understanding of the Organization and its Environment: The understanding of the
organization and its environment is used to assess the risk of material misstatement/weakness
and to set the scope of the audit. The auditor's understanding should include information on the
nature of the entity, management, governance, objectives and strategies, and business
processes.
Identify Risks that May Result in Material Misstatements: The auditor must evaluate an
organization's business risks (threats to the organization's ability to achieve its objectives). An
organization's business risks can arise or change due to new personnel, new or restructured
information systems, corporate restructuring, and rapid growth to name a few.
Evaluate the Organization's Response to those Risks: Once the auditor has evaluated the
organization's response to the assessed risks, the auditor should then obtain evidence of
management's actions toward those risks. The organization's response (or lack thereof) to any
business risks will impact the auditor's assessed level of audit risk.
Assess the Risk of Material Misstatement: Based on the knowledge obtained in evaluating the
organization's responses to business risks, the auditor then assesses the risk of material
misstatements and determines specific audit procedures that are necessary based on that risk
assessment.
Evaluate Results and Issue Audit Report: At this level, the auditor should determine if the
assessments of risks were appropriate and whether sufficient evidence was obtained. The auditor
will issue either an unqualified or qualified audit report based on their findings.
Answer:
D is incorrect. While MAC filtering may help prevent a hacker from accessing your network, it
won't keep him or her from finding your network.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
Explanation/Reference:
Explanation:
John will click the Disable button in the Software Explorer page to Disable the application running
on his computer.
Windows Defender is a software product designed by Microsoft to provide continuous security
against malware. If it detects anything suspicious, an alert will appear on the screen. Windows
Defender can also be used to scan a computer for suspicious software. It can remove or
quarantine any malware or spyware it finds.
The Quarantined items link will open the Quarantined items page that will help a user to remove
or restore software that Windows Defender has prevented from running.
The Allowed items link will open the Allowed items page that will help a user to view software that
are not monitored with Windows Defender.
Answer:
Explanation/Reference:
Explanation:
Explanation: Auditing encompasses a wide variety of activities as follows:
Logging: It is the activity of recording information to a log file or database about events or
occurrences.
Log Analysis: It is a systematic form of monitoring where the logged information is analyzed in
detail. It is done to find out the trends and patterns as well as abnormal, unauthorized, illegal, and
policy-violating activities.
Intrusion Detection: It is a process to detect unwanted system access by monitoring both
recorded information and real time events.
Alarm Triggers: These are the notifications that are sent to an administrator whenever a specific
event occurs.
Monitoring: It is the activity of manually or programmatically reviewing logged information.
Answer:
B is incorrect. Netcat is a freely available networking utility that reads and writes data across
network connections by using the TCP/IP protocol. Netcat has the following features: It provides
outbound and inbound connections for TCP and UDP ports. It provides special tunneling such as
UDP to TCP, with the possibility of specifying all network parameters. It is a good port scanner. It
contains advanced usage options, such as buffered send-mode (one line every N seconds), and
hexdump (to stderr or to a specified file) of transmitted and received data. It is an optional
RFC854 telnet code parser and responder.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
Answer:
A is incorrect. Safeguards are those controls that provide some amount of protection to an asset.
A. WPA-EAP
B. WEP
C. WPA-PSK
D. WPA2
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
WPA2 is an updated version of WPA. This standard is also known as IEEE 802.11i. WPA2 offers
enhanced protection to wireless networks than WPA and WEP standards. It is also available as
WPA2- PSK and WPA2-EAP for home and enterprise environment respectively. Answer: B is
incorrect. than WEP (Wired Equivalent Protection). Windows Vista supports both WPA-PSK and
WPA-EAP. Each of these is described as follows:
WPA-PSK: PSK stands for Preshared key. This standard is meant for home environment. WPA-
PSK
requires a user to enter an 8- character to 63-character passphrase into a wireless client. The
WPA converts the passphrase into a 256-bit key.
WPA-EAP: EAP stands for Extensible Authentication Protocol. This standard relies on a back-end
server that runs Remote Authentication Dial-In UserService for user authentication. Note:
Windows Vista supports a user to use a smart card to connect to a WPA-EAP protected network.
NEW QUESTION: 381
Which of the following tools can be used to perform ICMP tunneling? (Choose two)
Answer:
D is incorrect. Ethereal is a network sniffer.
Answer:
Explanation/Reference:
Explanation:
A choke router is an interior router present in the screened host firewall architecture. It is attached
to the perimeter network and protects the internal network from the Internet and the perimeter net.
A choke router is basically employed for the job of packet filtering for the firewall. It is also used to
provide access to selected services that are outbound from the internal net to the Internet. These
services may include outgoing Telnet, FTP, WAIS, Archie, Gopher, etc.
A Screened Host Firewall Architecture is used to provide services from a host that is attached
only to the internal network by using a separate router. In this type of firewall architecture, the key
security is provided by packet filtering.
The host exists in the internal network. The packet filtering on the screening router is configured
in such a way that the bastion host is the only system in the internal network that is open to the
Internet connections.
If any external system tries to access internal systems or services, then it will connect only to this
host. The bastion host therefore needs to be at a high level of security.
NEW QUESTION: 383
Which of the following statements about URL rewriting are true?
A. If cookies are supported by the browser, URL rewriting will return the URL unchanged.
B. The request.encodeRedirectURL() method is used to add a session id info to the URL and
send the request to another URL.
C. The request.encodeURL() method is used to add a session id info to the URL.
D. URL rewriting is used in cases where cookies are not supported by the browser.
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
By default, session tracking uses cookies to associate a session identifier with a unique user.
URL rewriting is used in cases where cookies are not supported by the browser.
Explanation/Reference:
Explanation:
Windows Defender is a software product designed by Microsoftto provide continuous security
against malware. If it detects anything suspicious, an alert will appear on the screen. Windows
Defender can also be used to scan a computer for suspicious software. It can remove or
quarantine any malware or spyware it finds.
Clicking on the Security Center icon will show the status of malware protection, status of firewall,
and other security settings.
Clicking on the Windows Firewall icon will open the Windows Firewall dialog box and allow a user
to configure the Windows Firewall settings.
Answer:
A, D are incorrect. Protective or preventative controls serve to proactively define and possibly
enforce acceptable behaviors. As an example, a set of common accounting rules are defined and
must be followed by any publicly traded company. Each quarter, any particular company must
publicly state its current financial standing and accounting as reflected by an application of these
rules. These accounting rules and the SEC requirements serve as protective or preventative
controls.
Answer:
Explanation/Reference:
Explanation:
In order to accomplish the task, you will have to take the following steps:
Install a WLAN access point on the network.
Install wireless network interface adapters on the laptops of the Sales Managers.
Create a Wireless Network policy and configure it to allow infrastructure networking only.
Apply the policy to the laptops of the Sales Managers.
Configuring the Wireless Network policy to allow infrastructure networking only will prevent the
Sales Managers from directly communicating with each other.
Although they will be able to communicate with each other by using this configuration, the
communication will be made through the access point.
The Ad hoc topology is used by wireless equipment, which are configured with the wireless
network interface adapters, to communicate directly with each other.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)
A. AiroPeek
B. AirSnort
C. Kismet
D. NetStumbler
Answer: (SHOW ANSWER)
Explanation/Reference:
Explanation:
NetStumbler, a war driving tool, uses an organizationally unique identifier (OID) of 0x00601A, D
protocol identifier (PID) of 0x0001. Each version has a typical payload string. For example,
NetStumbler 3.2.3 has a payload string: 'All your 802.11b are belong to us'. Therefore, when you
see the OID and PID values, you discover that the attacker is using NetStumbler, and when you
see the payload string, you are able to ascertain that the attacker is using NetStumbler 3.2.3.
Valid GSNA Dumps shared by PassTestKing.com for Helping Passing GSNA Exam!
PassTestKing.com now offer the newest GSNA exam dumps, the PassTestKing.com GSNA
exam questions have been updated and answers have been corrected get the newest
PassTestKing.com GSNA dumps with Test Engine here:
https://www.passtestking.com/GIAC/GSNA-practice-exam-dumps.html (368 Q&As Dumps,
35%OFF Special Discount Code: freecram)