Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

You have to move the whole directory /foo to /bar. Which of the following commands will you use to accomplish the task?

Options:

A.

mv /bar /foo


B.

mv -R /foo /bar


C.

mv /foo /bar


D.

mv -r /bar /foo


Expert Solution
Questions # 32:

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set some terminal characteristics and environment variables. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/sysconfig/routed


B.

/proc/net


C.

/etc/sysconfig/network-scripts/ifcfg-interface


D.

/etc/sysconfig/init


Expert Solution
Questions # 33:

An auditor assesses the database environment before beginning the audit. This includes various key tasks that should be performed by an auditor to identify and prioritize the users, data, activities, and applications to be monitored. Which of the following tasks need to be performed by the auditor manually?

Options:

A.

Classifying data risk within the database systems


B.

Monitoring data changes and modifications to the database structure, permission and user changes, and data viewing activities


C.

Analyzing access authority


D.

Archiving, analyzing, reviewing, and reporting of audit information


Expert Solution
Questions # 34:

What does CSS stand for?

Options:

A.

Cascading Style Sheet


B.

Coded System Sheet


C.

Cyclic Style Sheet


D.

Cascading Style System


Expert Solution
Questions # 35:

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.


B.

User performance monitors.


C.

Implement signature based antivirus.


D.

Implement an anomaly based IDS.


Expert Solution
Questions # 36:

You work as a Network Administrator for XYZ CORP. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks: The wireless network communication should be secured. The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps: Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you have taken these steps?

Options:

A.

Both tasks will be accomplished.


B.

The laptop users will be able to use smart cards for getting authenticated.


C.

The wireless network communication will be secured.


D.

None of the tasks will be accomplished.


Expert Solution
Questions # 37:

Which of the following are the goals of risk management? (Choose three)

Options:

A.

Identifying the risk


B.

Assessing the impact of potential threats


C.

Finding an economic balance between the impact of the risk and the cost of the countermeasure


D.

Identifying the accused


Expert Solution
Questions # 38:

You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues: The information has proved beneficial to an other company. The other company is located about 340 feet away from your office. The other company is also using wireless network. The bandwidth of your network has degraded to a great extent. Which of the following methods of attack has been used?

Options:

A.

A piggybacking attack has been performed.


B.

A DOS attack has been performed.


C.

The information is traced using Bluebugging.


D.

A worm has exported the information.


Expert Solution
Questions # 39:

Sam works as a Web Developer for McRobert Inc. He creates a Web site. He wants to include the following table in the Web site:

He writes the following HTML code to create the table:

1.

2.

3.

4.

5.

6.

7.

9.

11.

13.

14.

15.

17.

19.

21.

22.

8.

10.

12.

16.

18.

20.

Which of the following tags will Sam place at lines 3 and 4 to create the table?

Options:

A.

at line 3 at line 4


B.

at line 3 at line 4


C.

at line 4 at line


D.

at line 3 at line 4


Expert Solution
Questions # 40:

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

(Choose two)

Options:

A.

WPA2 -EAP


B.

WPA-PSK


C.

WEP


D.

WPA-EAP


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions