Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?

Options:

A.

149 and 133


B.

203 and 333


C.

139 and 445


D.

198 and 173


Expert Solution
Questions # 72:

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:

A.

A DNS Zone


B.

An Intranet


C.

A stub zone


D.

A demilitarized zone (DMZ)


Expert Solution
Questions # 73:

The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path. In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?

Options:

A.

Load


B.

MTU


C.

Hop count


D.

Bandwidth


Expert Solution
Questions # 74:

You work as an IT Technician for XYZ CORP. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

Options:

A.

RAS


B.

MAC Filtering


C.

SSID


D.

WEP


Expert Solution
Questions # 75:

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

Options:

A.

Using WPA encryption


B.

MAC filtering the router


C.

Not broadcasting SSID


D.

Using WEP encryption


Expert Solution
Questions # 76:

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

Options:

A.

No contractors shall have access to the authorized resources.


B.

No contractors shall be permitted to scan the network.


C.

No contractors shall have access to the unauthorized resources.


D.

No contractors can access FTP unless specifically granted permissions to use it.


Expert Solution
Questions # 77:

You want to append a tar file if the on-disk version of the tar file has a modification date more recent than its copy in the tar archive. Which of the following commands will you use to accomplish the task?

Options:

A.

tar -u


B.

tar -t


C.

tar -c


D.

tar –x


Expert Solution
Questions # 78:

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?

Options:

A.

Network mapper


B.

Protocol analyzer


C.

A port scanner


D.

Packet sniffer


Expert Solution
Questions # 79:

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based Enterprise network. The company uses Cisco IOS technologies in the Enterprise network. You have enabled system message logging (syslog) service on all the routers that are currently working in the network. The syslog service provides all the reports, and important error and notification messages. You want to store all the reports and messages. Choose the locations where you can store all of these.

Options:

A.

Auxiliary


B.

Buffer


C.

Syslog server


D.

tty lines


E.

Console


Expert Solution
Questions # 80:

You work as a programmer for uCertify.Inc. You have a session object named session1 with an attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1. Which of the following will be used to retrieve Attribute1?

Options:

A.

Object obj=binding1.getSession().getAttribute("Attribute1");


B.

Object obj=binding1.getAttribute("Attribute1");


C.

Long MyAttribute=session1.getAttribute("Attribute1");


D.

Object obj=session1.getAttribute("Attribute1");


E.

String str1=session1.getAttribute("Attribute1");


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions