Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company. Which of the following can be a cause for making the network vulnerable? (Choose two)

Options:

A.

Use of well-known code


B.

Use of uncommon code


C.

Use of uncommon software


D.

Use of more physical connections


Expert Solution
Questions # 42:

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. He wants to use frames in the Web site. Which of the following is an HTML tag used to create frames?

Options:

A.


B.


C.


D.


Expert Solution
Questions # 43:

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)

Options:

A.

nc 208.100.2.25 23


B.

nmap -v -O www.we-are-secure.com


C.

nc -v -n 208.100.2.25 80


D.

nmap -v -O 208.100.2.25


Expert Solution
Questions # 44:

Which of the following responsibilities does not come under the audit process?

Options:

A.

Reporting all facts and circumstances of the irregular and illegal acts.


B.

Planning the IT audit engagement based on the assessed level of risk.


C.

Reviewing the results of the audit procedures.


D.

Applying security policies.


Expert Solution
Questions # 45:

You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?

Options:

A.

The computers and their applications should be used for organizational related activities only.


B.

Computers may not be left unattended with a user account still logged on.


C.

Applications other than those supplied or approved by the company can be installed on any computer.


D.

The installed e-mail application can only be used as the authorized e-mail service.


Expert Solution
Questions # 46:

Which of the following controls define the direction and behavior required for technology to function properly?

Options:

A.

Detailed IS controls


B.

General controls


C.

Application controls


D.

Pervasive IS controls


Expert Solution
Questions # 47:

Which of the following statements about a screened host is true?

Options:

A.

It facilitates a more efficient use of the Internet connection bandwidth and hides the real IP addresses of computers located behind the proxy.


B.

It is a small network that lies in between the Internet and a private network.


C.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.


D.

It provides a physical connection between computers within a network.


Expert Solution
Questions # 48:

Which of the following tools is used to make fake authentication certificates?

Options:

A.

Obiwan


B.

Netcat


C.

WinSSLMiM


D.

Brutus


Expert Solution
Questions # 49:

Which of the following statements are true about data aggregation?

Options:

A.

A common aggregation purpose is to get more information about particular groups based on specific variables.


B.

Data aggregation cannot be user-based.


C.

Data aggregation is any process in which information is gathered and expressed in a summary form.


D.

Online analytic processing (OLAP) is a simple type of data aggregation.


Expert Solution
Questions # 50:

Which of the following statements is true about a relational database?

Options:

A.

It is difficult to extend a relational database.


B.

The standard user and application program interface to a relational database is Programming Language (PL).


C.

It is a collection of data items organized as a set of formally-described tables.


D.

It is a set of tables containing data fitted into runtime defined categories.


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions