Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 11

Questions 101

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

Options:
A.

httprint

B.

ServerMask

C.

Whisker

D.

WinSSLMiM

GIAC GSNA Premium Access
Questions 102

Which of the following statements are true about a hot site?

Options:
A.

It is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

B.

It is the most inexpensive backup site.

C.

It can be used within an hour for data recovery.

D.

It is cheaper than a cold site but more expensive than a worm site.

Questions 103

You work as a Network Administrator for Techpearl Inc. You are configuring the rules for the firewall of the company. You need to allow internal users to access secure external websites. Which of the following firewall rules will you use to accomplish the task?

Options:
A.

TCP 172.16.1.0/24 any any 80 HTTP permit

B.

TCP 172.16.1.0/24 any any 25 SMTP permit

C.

TCP 172.16.1.0/24 any any 80 HTTP deny

D.

TCP 172.16.1.0/24 any any 443 HTTPs permit

Questions 104

Sarah works as a Web Developer for XYZ CORP. She develops a Web site for the company. She uses tables in the Web site. Sarah embeds three tables within a table. What is the technique of embedding tables within a table known as?

Options:
A.

Nesting tables

B.

Stacking tables

C.

CSS tables

D.

Horned tables

Questions 105

You work as a Database Administrator for BigApple Inc. The Company uses Oracle as its database. You enabled standard database auditing. Later, you noticed that it has a huge impact on performance of the database by generating a large amount of audit data. How will you keep control on this audit data?

Options:
A.

By implementing principle of least privilege.

B.

By removing some potentially dangerous privileges.

C.

By setting the REMOTE_LOGIN_PASSWORDFILE instance parameter to NONE.

D.

By limiting the number of audit records generated to only those of interest.

Questions 106

Brutus is a password cracking tool that can be used to crack the following authentications: HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 (Post Office Protocol v3) FTP (File Transfer Protocol) SMB (Server Message Block) Telnet Which of the following attacks can be performed by Brutus for password cracking?

Options:
A.

Man-in-the-middle attack

B.

Hybrid attack

C.

Replay attack

D.

Brute force attack

E.

Dictionary attack

Questions 107

In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route. What are the benefits of using a static route?

Options:
A.

It is a fault tolerant path.

B.

It reduces load on routers, as no complex routing calculations are required.

C.

It reduces bandwidth usage, as there is no excessive router traffic.

D.

It provides precise control over the routes that packets will take across the network.

Questions 108

In an IT organization, some specific tasks require additional detailed controls to ensure that the workers perform their job correctly. What do these detailed controls specify? (Choose three)

Options:
A.

How the department handles acquisitions, security, delivery, implementation, and support of IS services

B.

How to lock a user account after unsuccessful logon attempts

C.

How output data is verified before being accepted into an application

D.

The way system security parameters are set

Questions 109

You work as the Network Administrator for XYZ CORP. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see first five lines of the file /etc/passwd. Which of the following commands should you use to accomplish the task?

Options:
A.

head -n 5 /etc/passwd

B.

head 5 -n /etc/passwd

C.

tail -n 5 /etc/passwd

D.

head /etc/passwd

Questions 110

You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

GSNA Question 110

You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task. Which of the following actions will you perform to accomplish the task?

Options:
A.

Create a scheduled task to download definition files for Windows Defender every Sunday.

B.

Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

C.

Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

D.

Click the arrow beside the Help button Click the Check for updates option.