Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 8

Questions 71

A Cisco router can have multiple connections to networks. These connections are known as interfaces for Cisco Routers. For naming each interface, Cisco generally uses the type of interface as part of the name. Which of the following are true about the naming conventions of Cisco Router interfaces?

Options:
A.

An interface connected to a serial connection always starts with an S.

B.

An interface connected to a Token Ring segment always starts with To.

C.

An Ethernet interface that is fast always starts with an F.

D.

An interface connected to an Ethernet segment of the network always starts with an En.

GIAC GSNA Premium Access
Questions 72

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?

Options:
A.

Network mapper

B.

Protocol analyzer

C.

A port scanner

D.

Packet sniffer

Questions 73

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? (Choose three)

Options:
A.

Configure the authentication type for the wireless LAN to Shared Key

B.

On each client computer, add the SSID for the wireless LAN as the preferred network

C.

Install a firewall software on each wireless access point

D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points

E.

Configure the authentication type for the wireless LAN to Open system

F.

Broadcast SSID to connect to the access point (AP)

Questions 74

Peter works as a Web Developer for XYZ CORP. He is developing a Web site for the company. Peter specifies MARGINHEIGHT="0" and MARGINWIDTH="0" in one of the Web pages. How will this affect the Web page?

Options:
A.

It will create a borderless page structure when viewed in any browser.

B.

It will create a borderless page structure when viewed in Netscape Navigator.

C.

It will delete all the text from the margins.

D.

It will create a borderless page structure when viewed in Internet Explorer.

Questions 75

Which of the following is a method of the HttpSession interface and is used to retrieve the time when the session was created?

Options:
A.

getCreationTime()

B.

getSessionCreationTime()

C.

getSessionTime()

D.

getTime()

Questions 76

You work as an IT Technician for XYZ CORP. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

Options:
A.

RAS

B.

MAC Filtering

C.

SSID

D.

WEP

Questions 77

The following output is generated by running the show ip route command: RouterA#show ip route < - - Output Omitted for brevity - -> Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:
A.

192.168.10.0

B.

172.18.60.1

C.

172.18.50.1

D.

172.18.1.1

Questions 78

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

Options:
A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

Questions 79

You are the Security Administrator for an Internet Service Provider. From time to time your company gets subpoenas from attorneys and law enforcement for records of customers' access to the internet. What policies must you have in place to be prepared for such requests?

Options:
A.

Group access policies

B.

Backup policies

C.

User access policies

D.

Storage and retention policies

Questions 80

Which of the following tools can be used to perform ICMP tunneling? (Choose two)

Options:
A.

Itunnel

B.

Ptunnel

C.

WinTunnel

D.

Ethereal