Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following commands can you use to search a string 'pwd' in all text files without opening them? (Choose two)

Options:

A.

vi


B.

grep


C.

sed


D.

locate


Expert Solution
Questions # 22:

Which of the following commands can be used to find out where commands are located?

Options:

A.

type


B.

which


C.

env


D.

ls


Expert Solution
Questions # 23:

You work as a Network Administrator for XYZ CORP. The company's Windows 2000 network is configured with Internet Security and Acceleration (ISA) Server 2000. ISA Server is configured as follows: The server uses the default site and content rule and default IP packet filters. Packet filtering is enabled. The server has two protocol rules:

Question # 23

Users in the network complain that they are unable to access secure Web sites. However, they are able to connect to Web sites in which secure transmission is not required. What is the most likely cause?

Options:

A.

A protocol rule that allows the use of HTTP has not been created.


B.

An IP packet filter that allows the use of network traffic on port 80 has not been created.


C.

An IP packet filter that allows the use of network traffic on port 443 has not been created.


D.

A protocol rule that allows the use of HTTPS has not been created.


Expert Solution
Questions # 24:

John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company. Which of the following can be the purpose of this analysis? (Choose three)

Options:

A.

To ensure absolute safety during the audit


B.

To analyze exposure to risk in order to support better decision-making and proper management of those risks


C.

To try to quantify the possible impact or loss of a threat


D.

To assist the auditor in identifying the risks and threats


Expert Solution
Questions # 25:

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

Options:

A.

The network layer headers and the session layer port numbers


B.

The transport layer port numbers and the application layer headers


C.

The application layer port numbers and the transport layer headers


D.

The presentation layer headers and the session layer port numbers


Expert Solution
Questions # 26:

Which of the following policies helps reduce the potential damage from the actions of one person?

Options:

A.

CSA


B.

Separation of duties


C.

Internal audit


D.

Risk assessment


Expert Solution
Questions # 27:

Which of the following key combinations in the vi editor is used to copy the current line?

Options:

A.

dk


B.

yy


C.

d$


D.

dl


Expert Solution
Questions # 28:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Eavesdropping


B.

Fingerprinting


C.

Web ripping


D.

TCP FTP proxy scanning


Expert Solution
Questions # 29:

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

Options:

A.

Non-operational audit


B.

Dependent audit


C.

Independent audit


D.

Operational audit


Expert Solution
Questions # 30:

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card? (Choose two)

Options:

A.

These tools can determine the rogue access point even when it is attached to a wired network.


B.

These tools can determine the authorization status of an access point.


C.

These tools cannot detect rogue access points if the victim is using data encryption.


D.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions