Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 11 out of 11 pages
Viewing questions 101-110 out of questions
Questions # 101:

Which of the following statements about system hardening are true? (Choose two)

Options:

A.

It is used for securing the computer hardware.


B.

It can be achieved by installing service packs and security updates on a regular basis.


C.

It can be achieved by locking the computer room.


D.

It is used for securing an operating system.


Expert Solution
Questions # 102:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/proc/meminfo


B.

/etc/sysconfig/amd


C.

/proc/modules


D.

/etc/sudoers


Expert Solution
Questions # 103:

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Options:

A.

It uses password hash for client authentication.


B.

It uses a public key certificate for server authentication.


C.

It is supported by all manufacturers of wireless LAN hardware and software.


D.

It provides a moderate level of security.


Expert Solution
Questions # 104:

Which of the following is a basic feature of the Unix operating system? (Choose three)

Options:

A.

It is highly portable across hardware.


B.

All files can be individually protected using read, write, and execute permissions for the user, group, and others.


C.

It allows all the modules to be loaded into memory.


D.

A user can execute multiple programs at the same time from a single terminal.


Expert Solution
Questions # 105:

What are the purposes of audit records on an information system? (Choose two)

Options:

A.

Upgradation


B.

Backup


C.

Troubleshooting


D.

Investigation


Expert Solution
Questions # 106:

You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You want to take a snapshot of the router running configuration and archive running configuration of the router to persistent storage. Which of the following steps will you take?

Options:

A.

Secure the boot configuration


B.

Restore an archived primary bootset


C.

Verify the security of the bootset


D.

Enable the image resilience


Expert Solution
Questions # 107:

You are responsible for a number of Windows Server 2003 DNS servers on a large corporate network. You have decided to audit the DNS server logs. Which of the following are likely errors you could encounter in the log? (Choose two)

Options:

A.

The DNS server could not create FTP socket for address [IP address of server].


B.

The DNS server could not open socket for domain name [domain name of server].


C.

The DNS server could not create a Transmission Control Protocol (TCP) socket.


D.

The DNS server could not open socket for address [IP address of server].


Expert Solution
Questions # 108:

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Web ripping


B.

Steganography


C.

Email spoofing


D.

Social engineering


Expert Solution
Questions # 109:

You work as a Network Administrator for Techpearl Inc. You are configuring the rules for the firewall of the company. You need to allow internal users to access secure external websites. Which of the following firewall rules will you use to accomplish the task?

Options:

A.

TCP 172.16.1.0/24 any any 80 HTTP permit


B.

TCP 172.16.1.0/24 any any 25 SMTP permit


C.

TCP 172.16.1.0/24 any any 80 HTTP deny


D.

TCP 172.16.1.0/24 any any 443 HTTPs permit


Expert Solution
Questions # 110:

Which of the following are known as safety critical software?

Options:

A.

Software that is used to apply a critical decision-making process


B.

Software that manages safety critical data including display of safety critical information


C.

Software that intervenes when a safe condition is present or is about to happen


D.

Software that is used to create safety critical functions


Expert Solution
Viewing page 11 out of 11 pages
Viewing questions 101-110 out of questions