Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

You are the Security Administrator for an Internet Service Provider. From time to time your company gets subpoenas from attorneys and law enforcement for records of customers' access to the internet. What policies must you have in place to be prepared for such requests?

Options:

A.

Group access policies


B.

Backup policies


C.

User access policies


D.

Storage and retention policies


Expert Solution
Questions # 62:

Choose the benefits of deploying switches over hubs in your infrastructure. (Choose two)

Options:

A.

Layer 2 switches allow for the creation of Virtual LANs providing options for further segmentation and security.


B.

Switches lower the number of collisions in the environment.


C.

Switches create an environment best suited for half duplex communications. This improves network performance and the amount of available bandwidth.


D.

Layer 2 switches increase the number of broadcast domains in the environment.


Expert Solution
Questions # 63:

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan


B.

Continuity of Operations Plan


C.

Business continuity plan


D.

Contingency plan


Expert Solution
Questions # 64:

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?

Options:

A.

It incorporates real-time reporting and real-time alerting.


B.

It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches & routers etc.), syslog servers etc.


C.

It is a software package for the statistical analysis and reporting of log files.


D.

It comes only as a software package for user deployment.


Expert Solution
Questions # 65:

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

Question # 65

Options:

A.

Snooping


B.

UDP port scanning


C.

Firewalking


D.

Port redirection


Expert Solution
Questions # 66:

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. A user is unable to access the Internet from Host B. You also verify that Host B is not able to connect to other resources on the network. The IP configuration of Host B is shown below:

Question # 66

Which of the following is the most likely cause of the issue?

Options:

A.

An incorrect subnet mask is configured on Host B.


B.

The IP address of Host B is not from the correct IP address range of the network.


C.

There is an IP address conflict on the network.


D.

An incorrect default gateway is configured on Host B.


Expert Solution
Questions # 67:

The following output is generated by running the show ip route command: RouterA#show ip route < - - Output Omitted for brevity - -> Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:

A.

192.168.10.0


B.

172.18.60.1


C.

172.18.50.1


D.

172.18.1.1


Expert Solution
Questions # 68:

Which of the following tools is used for port scanning?

Options:

A.

L0phtcrack


B.

NSLOOKUP


C.

NETSH


D.

Nmap


Expert Solution
Questions # 69:

Which of the following NFS mount options specifies whether a program using a file via an NFS connection should stop and wait for the server to come back online, if the host serving the exported file system is unavailable, or if it should report an error?

Options:

A.

intr


B.

hard or soft


C.

nfsvers=2 or nfsvers=3


D.

fsid=num


Expert Solution
Questions # 70:

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? (Choose three)

Options:

A.

Configure the authentication type for the wireless LAN to Shared Key


B.

On each client computer, add the SSID for the wireless LAN as the preferred network


C.

Install a firewall software on each wireless access point


D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points


E.

Configure the authentication type for the wireless LAN to Open system


F.

Broadcast SSID to connect to the access point (AP)


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions