Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 7

Questions 61

Which of the following statements about Secure Sockets Layer (SSL) are true? (Choose two)

Options:
A.

It provides connectivity between Web browser and Web server.

B.

It provides mail transfer service.

C.

It provides communication privacy, authentication, and message integrity.

D.

It uses a combination of public key and symmetric encryption for security of data.

GIAC GSNA Premium Access
Questions 62

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

GSNA Question 62

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

Options:
A.

Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B.

Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C.

Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D.

Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Questions 63

You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security. Which of the following devices would you use to accomplish the task?

Options:
A.

Proxy server

B.

IDS

C.

Packet filtering firewall

D.

honeypot

Questions 64

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a dat a.txt file, 200MB in size, into two files in which the size of the first file named data.txt.aa should be 150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command: split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt Which of the following commands can John use to join the splitted files into a new data.txt file?

Options:
A.

vi data.txt.* > data.txt

B.

less data.txt.* > data.txt

C.

vi data.txt.*

D.

cat data.txt.* > data.txt

Questions 65

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

Options:
A.

Determining network range

B.

Identifying active machines

C.

Enumeration

D.

Finding open ports and applications

E.

Information gathering

Questions 66

Mark works as a Database Administrator for MarLinc Inc. How will he execute a SQL command from the SQL buffer?

Options:
A.

Enter an asterisk (*)

B.

Enter a semicolon (;)

C.

Press [ESC] twice

D.

Press [RETURN] twice

E.

Enter a slash (/)

Questions 67

Which of the following types of authentication tokens forms a logical connection to the client computer but does not require a physical connection?

Options:
A.

Virtual token

B.

Connected token

C.

Disconnected token

D.

Contactless token

Questions 68

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Options:
A.

Path MTU discovery (PMTUD)

B.

AS Route Inference

C.

AS PATH Inference

D.

Firewalking

Questions 69

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:
A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Questions 70

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:
A.

DNS poisoning

B.

IP spoofing

C.

Mac flooding

D.

Man-in-the-middle