Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSNA Practice Exam with Questions & Answers | Set: 9

Questions 81

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? (Choose two)

Options:
A.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

B.

Attacker can use the Ping Flood DoS attack if WZC is used.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

GIAC GSNA Premium Access
Questions 82

Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?

Options:
A.

149 and 133

B.

203 and 333

C.

139 and 445

D.

198 and 173

Questions 83

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:
A.

Implement WPA

B.

Implement WEP

C.

Don't broadcast SSID

D.

Implement MAC filtering

Questions 84

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:
A.

A DNS Zone

B.

An Intranet

C.

A stub zone

D.

A demilitarized zone (DMZ)

Questions 85

John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linux-based network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?

Options:
A.

echo $VAR1

B.

touch VAR1

C.

export VAR1

D.

env -u VAR1

Questions 86

Which of the following statements are true about MS-CHAPv2?

Options:
A.

It is a connectionless protocol.

B.

It provides an authenticator-controlled password change mechanism.

C.

It is subject to offline dictionary attacks.

D.

It can be replaced with EAP-TLS as the authentication mechanism for PPTP.

Questions 87

Which of the following statements are true about the Enum tool?

Options:
A.

It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information, etc.

B.

It is capable of performing brute force and dictionary attacks on individual accounts of Windows NT/2000.

C.

One of the countermeasures against the Enum tool is to disable TCP port 139/445.

D.

It is a console-based Win32 information enumeration utility.

Questions 88

Mark works as the Network Administrator for XYZ CORP. The company has a Unix-based network. Mark wants to scan one of the Unix systems to detect security vulnerabilities. To accomplish this, he uses TARA as a system scanner. What can be the reasons that made Mark use TARA?

Options:
A.

It has a very specific function of seeking paths to root.

B.

It is composed mostly of bash scripts

C.

It works on a wide variety of platforms.

D.

It is very modular.

Questions 89

Which of the following is a type of web site monitoring that is done using web browser emulation or scripted real web browsers?

Options:
A.

Route analytics

B.

Passive monitoring

C.

Network tomography

D.

Synthetic monitoring

Questions 90

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:
A.

NTLM authentication

B.

Digest authentication

C.

Microsoft Passport authentication

D.

Basic authentication