Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 6

Questions 51

You work as a Java Programmer for JavaSkills Inc. You are working with the Linux operating system. Nowadays, when you start your computer, you notice that your OS is taking more time to boot than usual. You discuss this with your Network Administrator. He suggests that you mail him your Linux bootup report. Which of the following commands will you use to create the Linux bootup report?

Options:
A.

touch bootup_report.txt

B.

dmesg > bootup_report.txt

C.

dmesg | wc

D.

man touch

GIAC GSNA Premium Access
Questions 52

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

Options:
A.

None, adding a wireless access point is a common task and not a security risk.

B.

It is likely to increase network traffic and slow down network performance.

C.

This circumvents network intrusion detection.

D.

An unauthorized WAP is one way for hackers to get into a network.

Questions 53

Which of the following tools is used to make fake authentication certificates?

Options:
A.

Obiwan

B.

Netcat

C.

WinSSLMiM

D.

Brutus

Questions 54

Which of the following statements is true about a relational database?

Options:
A.

It is difficult to extend a relational database.

B.

The standard user and application program interface to a relational database is Programming Language (PL).

C.

It is a collection of data items organized as a set of formally-described tables.

D.

It is a set of tables containing data fitted into runtime defined categories.

Questions 55

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

Options:
A.

Session Hijacking

B.

Bluesnarfing

C.

Privilege Escalation

D.

PDA Hijacking

Questions 56

Which of the following mechanisms is closely related to authorization?

Options:
A.

Sending secret data such as credit card information.

B.

Allowing access to a particular resource.

C.

Verifying username and password.

D.

Sending data so that no one can alter it on the way.

Questions 57

Which of the following tools can be used by a user to hide his identity?

Options:
A.

War dialer

B.

IPchains

C.

Proxy server

D.

Rootkit

E.

Anonymizer

Questions 58

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:
A.

IEEE 802.1X using EAP-TLS

B.

IEEE 802.1X using PEAP-MS-CHAP

C.

Pre-shared key

D.

Open system

Questions 59

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Options:
A.

Snort

B.

IDS

C.

Firewall

D.

WIPS

Questions 60

Which of the following services are provided by the proxy servers?

Options:
A.

Intrusion detection

B.

Logging

C.

Hiding network resources

D.

Caching