Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 4

Questions 31

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1. Original cookie values: ItemID1=2 ItemPrice1=900 ItemID2=1 ItemPrice2=200 Modified cookie values: ItemID1=2 ItemPrice1=1 ItemID2=1 ItemPrice2=1 Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price. Which of the following hacking techniques is John performing?

Options:
A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

GIAC GSNA Premium Access
Questions 32

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:
A.

Residual risk

B.

Inherent risk

C.

Secondary risk

D.

Detection risk

Questions 33

Which of the following encryption encoding techniques is used in the basic authentication method?

Options:
A.

HMAC_MD5

B.

Md5

C.

DES (ECB mode)

D.

Base64

Questions 34

Which of the following are HTML tags, used to create a table?

Options:
A.

B.

C.

D.

E.

F.

, , and
tags. The tag designs the table layout, the tag is used to create a row, and the
tag is used to create a column. For example, the following code generates a table with two rows and two columns:

Cell 1 Cell 2
Cell 3 Cell 4

Answer: C, E, and D are incorrect. There are no HTML tags such as

, , and .

Questions 35

Which of the following is a technique for creating Internet maps? (Choose two)

Options:
A.

AS PATH Inference

B.

Object Relational Mapping

C.

Active Probing

D.

Network Quota

Questions 36

Which of the following encryption modes are possible in WEP?

Options:
A.

128 bit encryption

B.

No encryption

C.

256 bit encryption

D.

40 bit encryption

Questions 37

You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues: The information has proved beneficial to an other company. The other company is located about 340 feet away from your office. The other company is also using wireless network. The bandwidth of your network has degraded to a great extent. Which of the following methods of attack has been used?

Options:
A.

A piggybacking attack has been performed.

B.

A DOS attack has been performed.

C.

The information is traced using Bluebugging.

D.

A worm has exported the information.

Questions 38

What are the different categories of PL/SQL program units?

Options:
A.

Default

B.

Unnamed

C.

Primary

D.

Named

Questions 39

Patricia joins XYZ CORP., as a Web Developer. While reviewing the company's Web site, she finds that many words including keywords are misspelled. How will this affect the Web site traffic?

Options:
A.

Leave a bad impression on users.

B.

Search engine relevancy may be altered.

C.

Link exchange with other sites becomes difficult.

D.

The domain name cannot be registered.

Questions 40

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:
A.

Safeguards

B.

Detective controls

C.

Corrective controls

D.

Preventive controls

PDF + Testing Engine
$164.99
$66
Testing Engine
$124.99
$50
PDF (Q&A)
$104.99
$42