Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 2

Questions 11

You work as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. You have used the LogMiner feature for auditing purposes. Which of the following files store a copy of the data dictionary? (Choose two)

Options:
A.

Online redo log files

B.

Operating system flat file

C.

Dump file

D.

Control file

GIAC GSNA Premium Access
Questions 12

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets: 10.10.2.103 10.10.0.0/24 Which of the following sets of commands will you use to accomplish the task?

Options:
A.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4 access-class 10 out

B.

access-list 10 permit 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4 access-group 10 in

C.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any line vty 0 4

access-class 10 in

D.

access-list 10 permit host 10.10.2.103

access-list 11 permit host 10.10.0.0 255.255.255.0

access-list 12 deny any line vty 0 4

access-group 10, 11, 12 in

Questions 13

Pervasive IS controls can be used across all the internal departments and external contractors to define the direction and behavior required for the technology to function properly. When these controls are implemented properly, which of the following areas show the reliability improvement? (Choose three)

Options:
A.

Hardware development

B.

Software development

C.

Security administration

D.

Disaster recovery

Questions 14

Which of the following is an example of penetration testing?

Options:
A.

Configuring firewall to block unauthorized traffic

B.

Implementing HIDS on a computer

C.

Simulating an actual attack on a network

D.

Implementing NIDS on a network

Questions 15

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer? (Choose two)

Options:
A.

SSID of the WLAN

B.

WEP key

C.

IP address of the router

D.

MAC address of the router

Questions 16

One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PD A. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?

Options:
A.

Spam

B.

Blue snarfing

C.

A virus

D.

Blue jacking

Questions 17

Which of the following statements is NOT true about FAT16 file system?

Options:
A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

B.

FAT16 file system supports file-level compression.

C.

FAT16 does not support file-level security.

D.

FAT16 file system supports Linux operating system.

Questions 18

Which of the following statements are true about security risks? (Choose three)

Options:
A.

They can be removed completely by taking proper actions.

B.

They are considered an indicator of threats coupled with vulnerability.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They can be analyzed and measured by the risk analysis process.

Questions 19

You work as a Network Administrator for Tech Perfect Inc. You need to configure the company firewall so that only Simple Network Management Protocol (SNMP) and Secure HTTP (HTTPS) traffic is allowed into the intranet of the company. No other traffic should be allowed into the intranet. Which of the following rule sets should you use on your firewall to accomplish the task? (Assume left to right equals top to bottom.)

Options:
A.

Output chain: allow port 443, allow 25, deny all

B.

Input chain: deny all, allow port 25, allow 443

C.

Input chain: allow port 25, allow 443, deny all

D.

Output chain: allow port 25, allow 443, deny all

Questions 20

From an auditing perspective, database security can be broken down into four key categories: Server Security Database Connections Table Access Control Restricting Database Access Which of the following categories leads to the process of limiting access to the database server?

Options:
A.

Table access control

B.

Database connections

C.

Restricting database access

D.

Server security