Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 3

Questions 21

You work as a Software Developer for UcTech Inc. You want to ensure that a class is informed whenever an attribute is added, removed, or replaced in a session. Which of the following is the event that you will use to accomplish the task?

Options:
A.

HttpSessionBindingEvent

B.

HttpAttributeEvent

C.

HttpSessionEvent

D.

HttpSessionAttributeEvent

GIAC GSNA Premium Access
Questions 22

Pingdom is a website monitoring service. Which of the following services are provided by Pingdom?

Options:
A.

It creates complicated charts to spot trends and imprecisely pinpoint problems.

B.

It works as an iPhone application to make sure that a website is reachable and responding properly at all times.

C.

It is used to monitor sites and servers on the Internet.

D.

It is used to track the uptime, downtime, and performance of websites.

Questions 23

In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?

Options:
A.

Xmas Tree scanning

B.

TCP FIN scanning

C.

TCP SYN scanning

D.

Bounce attack scanning

Questions 24

Which of the following statements about the /etc/profile file are true?

Options:
A.

It allows a system administrator to create a default home directory for all new users on a computer.

B.

A user can change the settings of the /etc/profile file, but he cannot delete the file. It can only be deleted by the root user.

C.

It can change the default umask value.

D.

It is used to configure and control system-wide default variables.

Questions 25

Which of the following is a prevention-driven activity to reduce errors in the project and to help the project meet its requirements?

Options:
A.

Audit sampling

B.

Asset management

C.

Access control

D.

Quality assurance

Questions 26

Zorp is a proxy firewall suite developed by Balabit IT Security. Which of the following statements are true about Zorp?

Options:
A.

It allows the administrators to fine-tune proxy decisions.

B.

Zorp aims for compliance with the Common Criteria/Application Level Firewall Protection Profile for Medium Robustness.

C.

It allows full analysis of embedded protocols.

D.

The GPL version of Zorp lacks much of the usability and functions from the other versions.

Questions 27

You have been assigned a project to develop a Web site for a construction company. You have to develop a Web site and want to get more control over the appearance and presentation of your Web pages. You also want to increase the ability to precisely specify the location and appearance of the elements on a page and create special effects. You plan to use Cascading style sheets (CSS). You want to apply the same style consistently throughout your Web site. Which type of style sheet will you use?

Options:
A.

Internal Style Sheet

B.

External Style Sheet

C.

Inline Style Sheet

D.

Embedded Style Sheet

Questions 28

You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You have mplemented four VPN connections in the network. You use the Cisco IOS on the network. Which feature will you enable to maintain a separate routing and forwarding table for each VPN?

Options:
A.

Intrusion Prevention System

B.

VRF-aware firewall

C.

Virtual Private Network

D.

Stateful firewall

Questions 29

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

Options:
A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Questions 30

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. You want to run two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has executed successfully. Which of the following command sequences will John use to accomplish the task?

Options:
A.

foo; bar;

B.

foo || bar;

C.

foo | bar;

D.

foo && bar;