Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 5

Questions 41

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You configure a new Windows Server 2008 server in the network. The new server is not yet linked to Active Directory. You are required to accomplish the following tasks: Add a new group named "Sales". Copy the "Returns" group from the older server to the new one. Rename the "Returns" group to "Revenue". View all group members, including for multiple groups/entire domain. You use Hyena to simplify and centralize all of these tasks. Which of the assigned tasks will you be able to accomplish?

Options:
A.

Copy the "Returns" group to the new server.

B.

Rename the "Returns" group to "Revenue".

C.

Add the new group named "Sales".

D.

View and manage all group members, including for multiple groups/entire domain.

GIAC GSNA Premium Access
Questions 42

Sam works as a Web Developer for McRobert Inc. He creates a Web site. He wants to include the following table in the Web site:

He writes the following HTML code to create the table:

1.

2.

3.

4.

5.

6.

7.

9.

11.

13.

14.

15.

17.

19.

21.

22.

8.

10.

12.

16.

18.

20.

Which of the following tags will Sam place at lines 3 and 4 to create the table?

Options:
A.

at line 3 at line 4

B.

at line 3 at line 4

C.

at line 4 at line

D.

at line 3 at line 4

Questions 43

In which of the following is absolute size of frames expressed?

Options:
A.

Bits

B.

Percentage

C.

Inches

D.

Pixels

Questions 44

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:
A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Questions 45

You are responsible for a large network that has its own DNS servers. You periodically check the log to see if there are any problems. Which of the following are likely errors you might encounter in the log? (Choose three)

Options:
A.

The DNS server could not create FTP socket for address [IP address of server]

B.

The DNS server could not create an SMTP socket

C.

Active Directory Errors

D.

The DNS server could not create a Transmission Control Protocol (TCP) socket

E.

The DNS server could not initialize the Remote Procedure Call (RPC) service

Questions 46

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card? (Choose two)

Options:
A.

These tools can determine the rogue access point even when it is attached to a wired network.

B.

These tools can determine the authorization status of an access point.

C.

These tools cannot detect rogue access points if the victim is using data encryption.

D.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

Questions 47

Which of the following is a wireless auditing tool that is used to pinpoint the actual physical location of wireless devices in the network?

Options:
A.

KisMAC

B.

Ekahau

C.

Kismet

D.

AirSnort

Questions 48

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

Options:
A.

20

B.

443

C.

80

D.

21

Questions 49

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company. Which of the following can be a cause for making the network vulnerable? (Choose two)

Options:
A.

Use of well-known code

B.

Use of uncommon code

C.

Use of uncommon software

D.

Use of more physical connections

Questions 50

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)

Options:
A.

nc 208.100.2.25 23

B.

nmap -v -O <a href="www.we-are-secure.com">www.we-are-secure.com</a>

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25