Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs? (Choose two)

Options:

A.

Using personal firewall software on your Laptop.


B.

Using a protocol analyzer on your Laptop to monitor for risks.


C.

Using portscanner like nmap in your network.


D.

Using an IPSec enabled VPN for remote connectivity.


Questions # 2:

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Options:

A.

TIS authentication


B.

Kerberos authentication


C.

Rhosts (rsh-style) authentication


D.

Password-based authentication


Questions # 3:

In a network, a data packet is received by a router for transmitting it to another network. In order to make decisions on where the data packet should be forwarded, the router checks with its routing table. Which of the following lists does a router check in a routing table?

Options:

A.

Available networks


B.

Available packets


C.

Available protocols


D.

Available paths


Questions # 4:

Web mining allows a user to look for patterns in data through content mining, structure mining, and usage mining. What is the function of structure mining?

Options:

A.

To examine data collected by search engines


B.

To examine data collected by Web spiders


C.

To examine data related to the structure of a particular Web site


D.

To examine data related to a particular user's browser


Questions # 5:

You work as a Software Developer for Cinera Softwares Inc. You create a DHTML page that contains ten TextBox controls to get information from the users who use your application. You want all the components placed on the DHTML page to be repositioned dynamically, when a user resizes the browser window. Which of the following will you use for this?

Options:

A.

Use the position attribute of the Cascading Style Sheet.


B.

Use the OnResize event for the DHTML page object.


C.

Use the Resize event of the Document object.


D.

Use the OnResize event of the Cascading Style Sheet.


Questions # 6:

Data mining is a process of sorting through data to identify patterns and establish relationships. Which of the following data mining parameters looks for patterns where one event is connected to another event?

Options:

A.

Sequence or path analysis


B.

Forecasting


C.

Clustering


D.

Association


Questions # 7:

Which of the following statements is NOT true about FAT16 file system?

Options:

A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.


B.

FAT16 file system supports file-level compression.


C.

FAT16 does not support file-level security.


D.

FAT16 file system supports Linux operating system.


Questions # 8:

Which of the following are attributes of the

tag? (Choose three)

Options:

A.

BORDER


B.

ALIGN


C.

TD


D.

WIDTH


tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the
tag is used to set the width of the table border. Answer: C is incorrect.
is not an attribute of the tag. It is a tag used to specify cells in a table.

Questions # 9:

You want to change the number of characters displaying on the screen while reading a txt file. However, you do not want to change the format of the txt file. Which of the following commands can be used to view (but not modify) the contents of the text file on the terminal screen at a time?

Options:

A.

cat


B.

tail


C.

less


D.

more


Questions # 10:

Which of the following is an example of penetration testing?

Options:

A.

Configuring firewall to block unauthorized traffic


B.

Implementing HIDS on a computer


C.

Simulating an actual attack on a network


D.

Implementing NIDS on a network


Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions