Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 10

Questions 91

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:
A.

Transference

B.

Mitigation

C.

Acceptance

D.

Avoidance

GIAC GSNA Premium Access
Questions 92

Samantha works as a Web Developer for XYZ CORP. She develops a Web application using Visual InterDev. She wants to group a series of HTML elements together so that an action can be performed collectively on them. Which of the following tags will Samantha use to accomplish this?

Options:
A.

DIV

B.

GROUP

C.

BODY

D.

SPAN

Questions 93

You work as a Desktop Support Technician for XYZ CORP. The company uses a Windows-based network comprising 50 Windows XP Professional computers. You want to include the Safe Mode with Command Prompt feature into the boot.ini file of a Windows XP Professional computer. Which of the following switches will you use?

Options:
A.

/safeboot:network /sos /bootlog /noguiboot

B.

/safeboot:minimal /sos /bootlog /noguiboot

C.

/safeboot:minimal(alternateshell) /sos /bootlog /noguiboot

D.

/safeboot:dsrepair /sos

Questions 94

Which of the following are known as safety critical software?

Options:
A.

Software that is used to apply a critical decision-making process

B.

Software that manages safety critical data including display of safety critical information

C.

Software that intervenes when a safe condition is present or is about to happen

D.

Software that is used to create safety critical functions

Questions 95

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:
A.

Protocol

B.

ActiveX control

C.

Cookie

D.

Keyword

Questions 96

You work as a Software Developer for XYZ CORP. You create a SQL server database named DATA1 that will manage the payroll system of the company. DATA1 contains two tables named EmployeeData, Department. While EmployeeData records detailed information of the employees, Department stores information about the available departments in the company. EmployeeData consists of columns that include EmpID, EmpName, DtOBrth, DtOJoin, DeptNo, Desig, BasicSal, etc. You want to ensure that each employee ID is unique and is not shared between two or more employees. You also want to ensure that the employees enter only valid department numbers in the DeptNo column. Which of the following actions will you perform to accomplish the task?

Options:
A.

Define triggers in the EmployeeData table.

B.

Add stored procedures by using Transact-SQL queries.

C.

Add constraints to the EmployeeData table.

D.

Define indexes in the EmployeeData table.

E.

Define views in the database.

Questions 97

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He executes the following command in the terminal: echo $USER, $UID Which of the following will be displayed as the correct output of the above command?

Options:
A.

John, 0

B.

root, 0

C.

root, 500

D.

John, 502

Questions 98

You are responsible for a number of Windows Server 2003 DNS servers on a large corporate network. You have decided to audit the DNS server logs. Which of the following are likely errors you could encounter in the log? (Choose two)

Options:
A.

The DNS server could not create FTP socket for address [IP address of server].

B.

The DNS server could not open socket for domain name [domain name of server].

C.

The DNS server could not create a Transmission Control Protocol (TCP) socket.

D.

The DNS server could not open socket for address [IP address of server].

Questions 99

Which of the following processes are involved under the COBIT framework?

Options:
A.

Managing the IT workforce.

B.

Correcting all risk issues.

C.

Conducting IT risk assessments.

D.

Developing a strategic plan.

Questions 100

Which of the following are the disadvantages of Dual-Homed Host Firewall Architecture?

Options:
A.

It can provide services by proxying them.

B.

It can provide a very low level of control.

C.

User accounts may unexpectedly enable services a user may not consider secure.

D.

It provides services when users log on to the dual-homed host directly.