Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following tools can be used to perform ICMP tunneling? (Choose two)

Options:

A.

Itunnel


B.

Ptunnel


C.

WinTunnel


D.

Ethereal


Expert Solution
Questions # 82:

Mark works as a Database Administrator for MarLinc Inc. How will he execute a SQL command from the SQL buffer?

Options:

A.

Enter an asterisk (*)


B.

Enter a semicolon (;)


C.

Press [ESC] twice


D.

Press [RETURN] twice


E.

Enter a slash (/)


Expert Solution
Questions # 83:

Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names. (Choose two)

Options:

A.

TCP Port 443 / S-HTTP or SSL


B.

TCP Port 80 / HTTPS or SSL


C.

TCP Port 443 / HTTPS or SSL


D.

TCP Port 80 / HTTP


Expert Solution
Questions # 84:

You work as a Network Analyst for XYZ CORP. The company has a Unix-based network. You want to view the directories in alphabetical order. Which of the following Unix commands will you use to accomplish the task?

Options:

A.

cat


B.

chmod


C.

cp


D.

ls


Expert Solution
Questions # 85:

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. The Manager of the company requires Mark to use tables instead of frames in the Web site. What is the major advantage that a table-structured Web site has over a frame-structured Web site?

Options:

A.

Easy maintenance


B.

Speed


C.

Better navigation


D.

Capability of being bookmarked or added to the Favorites folder


Expert Solution
Questions # 86:

Which of the following processes are involved under the COBIT framework?

Options:

A.

Managing the IT workforce.


B.

Correcting all risk issues.


C.

Conducting IT risk assessments.


D.

Developing a strategic plan.


Expert Solution
Questions # 87:

What is the extension of a Cascading Style Sheet?

Options:

A.

.hts


B.

.cs


C.

.js


D.

.css


Expert Solution
Questions # 88:

Which of the following is an attempt to give false information or to deny that a real event or transaction should have occurred?

Options:

A.

A DDoS attack


B.

A repudiation attack


C.

A reply attack


D.

A dictionary attack


Expert Solution
Questions # 89:

Which of the following statements are true about WPA?

Options:

A.

WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.


B.

Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.


C.

WPA-PSK converts the passphrase into a 256-bit key.


D.

WPA provides better security than WEP.


Expert Solution
Questions # 90:

Which of the following functions are performed by methods of the HttpSessionActivationListener interface?

Options:

A.

Notifying an attribute that a session has just migrated from one JVM to another.


B.

Notifying the object when it is unbound from a session.


C.

Notifying the object when it is bound to a session.


D.

Notifying an attribute that a session is about to migrate from one JVM to another.


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions