Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

GSNA GIAC Systems and Network Auditor Questions and Answers

Questions 4

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

Options:

A.

HTTP

B.

TELNET

C.

NetBIOS

D.

HTTPS

Buy Now
Questions 5

Which of the following statements about URL rewriting are true?

Options:

A.

If cookies are supported by the browser, URL rewriting will return the URL unchanged.

B.

The request.encodeRedirectURL() method is used to add a session id info to the URL and send the request to another URL.

C.

The request.encodeURL() method is used to add a session id info to the URL.

D.

URL rewriting is used in cases where cookies are not supported by the browser.

Buy Now
Questions 6

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log

B.

IDS log

C.

System log

D.

Firewall log

Buy Now
Questions 7

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Buy Now
Questions 8

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

Options:

A.

Setting up of monitoring on ISA Server

B.

Defining how ISA Server would cache Web contents

C.

Defining ISA Server network configuration

D.

Configuration of VPN access

Buy Now
Questions 9

Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?

Options:

A.

tac

B.

tr

C.

cat

D.

less

Buy Now
Questions 10

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)

Options:

A.

nc 208.100.2.25 23

B.

nmap -v -O www.we-are-secure.com

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25

Buy Now
Questions 11

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?

Options:

A.

Residual risk

B.

Inherent risk

C.

Secondary risk

D.

Detection risk

Buy Now
Questions 12

Which of the following responsibilities does not come under the audit process?

Options:

A.

Reporting all facts and circumstances of the irregular and illegal acts.

B.

Planning the IT audit engagement based on the assessed level of risk.

C.

Reviewing the results of the audit procedures.

D.

Applying security policies.

Buy Now
Questions 13

What are the different categories of PL/SQL program units?

Options:

A.

Default

B.

Unnamed

C.

Primary

D.

Named

Buy Now
Questions 14

Which of the following statements about a screened host is true?

Options:

A.

It facilitates a more efficient use of the Internet connection bandwidth and hides the real IP addresses of computers located behind the proxy.

B.

It is a small network that lies in between the Internet and a private network.

C.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

D.

It provides a physical connection between computers within a network.

Buy Now
Questions 15

Which of the following statements is true about a relational database?

Options:

A.

It is difficult to extend a relational database.

B.

The standard user and application program interface to a relational database is Programming Language (PL).

C.

It is a collection of data items organized as a set of formally-described tables.

D.

It is a set of tables containing data fitted into runtime defined categories.

Buy Now
Questions 16

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

Options:

A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Buy Now
Questions 17

You have an online video library. You want to upload a directory of movies. Since this process will take several hours, you want to ensure that the process continues even after the terminal is shut down or session is closed. What will you do to accomplish the task?

Options:

A.

Use the bg command to run the process at the background.

B.

Add the nohup command in front of the process.

C.

Add the nohup command at the end of the process.

D.

Run the process inside a GNU Screen-style screen multiplexer.

Buy Now
Questions 18

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Exposure Factor (EF)

D.

Safeguard

Buy Now
Questions 19

Which of the following records is the first entry in a DNS database file?

Options:

A.

CNAME

B.

SOA

C.

SRV

D.

MX

Buy Now
Questions 20

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of specific types of packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It is used to store information about confidential data.

Buy Now
Questions 21

You work as a Software Developer for UcTech Inc. You want to ensure that a class is informed whenever an attribute is added, removed, or replaced in a session. Which of the following is the event that you will use to accomplish the task?

Options:

A.

HttpSessionBindingEvent

B.

HttpAttributeEvent

C.

HttpSessionEvent

D.

HttpSessionAttributeEvent

Buy Now
Questions 22

On which of the following does a CGI program execute?

Options:

A.

Router

B.

Web server

C.

Client

D.

Client and Web server

Buy Now
Questions 23

Which of the following types of firewall ensures that the packets are part of the established session?

Options:

A.

Stateful inspection firewall

B.

Switch-level firewall

C.

Circuit-level firewall

D.

Application-level firewall

Buy Now
Questions 24

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

A3-07-B9-E3-BC-F9

B.

F936.28A1.5BCD.DEFA

C.

1011-0011-1010-1110-1100-0001

D.

132.298.1.23

Buy Now
Questions 25

Which of the following aaa accounting commands should be used to enable logging of both the start and stop records for user terminal sessions on the router?

Options:

A.

aaa accounting auth proxy start-stop tacacs+

B.

aaa accounting system none tacacs+

C.

aaa accounting connection start-stop tacacs+

D.

aaa accounting exec start-stop tacacs+

Buy Now
Questions 26

Which of the following are attributes of the

tag? (Choose three)

Options:

A.

BORDER

B.

ALIGN

C.

TD

D.

WIDTH

Buy Now
tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the
tag is used to set the width of the table border. Answer: C is incorrect.
is not an attribute of the tag. It is a tag used to specify cells in a table.

Questions 27

In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?

Options:

A.

Xmas Tree scanning

B.

TCP FIN scanning

C.

TCP SYN scanning

D.

Bounce attack scanning

Buy Now
Questions 28

Which of the following statements is NOT true about FAT16 file system?

Options:

A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

B.

FAT16 file system supports file-level compression.

C.

FAT16 does not support file-level security.

D.

FAT16 file system supports Linux operating system.

Buy Now
Questions 29

From an auditing perspective, database security can be broken down into four key categories: Server Security Database Connections Table Access Control Restricting Database Access Which of the following categories leads to the process of limiting access to the database server?

Options:

A.

Table access control

B.

Database connections

C.

Restricting database access

D.

Server security

Buy Now
Questions 30

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Protective controls

B.

Reactive controls

C.

Detective controls

D.

Preventive controls

Buy Now
Questions 31

You have been assigned a project to develop a Web site for a construction company. You have to develop a Web site and want to get more control over the appearance and presentation of your Web pages. You also want to increase the ability to precisely specify the location and appearance of the elements on a page and create special effects. You plan to use Cascading style sheets (CSS). You want to apply the same style consistently throughout your Web site. Which type of style sheet will you use?

Options:

A.

Internal Style Sheet

B.

External Style Sheet

C.

Inline Style Sheet

D.

Embedded Style Sheet

Buy Now
Questions 32

Zorp is a proxy firewall suite developed by Balabit IT Security. Which of the following statements are true about Zorp?

Options:

A.

It allows the administrators to fine-tune proxy decisions.

B.

Zorp aims for compliance with the Common Criteria/Application Level Firewall Protection Profile for Medium Robustness.

C.

It allows full analysis of embedded protocols.

D.

The GPL version of Zorp lacks much of the usability and functions from the other versions.

Buy Now
Questions 33

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs? (Choose two)

Options:

A.

Using personal firewall software on your Laptop.

B.

Using a protocol analyzer on your Laptop to monitor for risks.

C.

Using portscanner like nmap in your network.

D.

Using an IPSec enabled VPN for remote connectivity.

Buy Now
Questions 34

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires fast processing of the data in the database of the company so that answers to queries can be generated quickly. To provide fast processing, you have a conceptual idea of representing the dimensions of data available to a user in the data cube format. Which of the following systems can you use to implement your idea?

Options:

A.

SYSDBA

B.

MDDBMS

C.

Federated database system

D.

Hierarchical database system

Buy Now
Questions 35

Which of the following techniques can be used to determine the network ranges of any network?

Options:

A.

Whois query

B.

SQL injection

C.

Snooping

D.

Web ripping

Buy Now
Questions 36

Mike works as a Network Engineer for XYZ CORP. The company has a multi-platform network. Recently, the company faced lots of blended threat issues that lead to several drastic attacks. Mike has been assigned a project to manage the resources and services of the company through both Intranet and Internet to protect the company from these attacks. Mike needs a system that provides auto-discovering and network topology building features to allow him to keep an intuitive view of the IT infrastructure. What will Mike use to meet the requirement of the project?

Options:

A.

eBox

B.

dopplerVUe

C.

David system

D.

EM7

Buy Now
Questions 37

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up a honey pot

B.

Vulnerability scanning

C.

Setting up IDS

D.

Port scanning

Buy Now
Questions 38

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address 210.213.23.21. This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

Options:

A.

24171811

B.

24619311

C.

24171111

D.

24171311

Buy Now
Questions 39

Which of the following tools can be used to perform ICMP tunneling? (Choose two)

Options:

A.

Itunnel

B.

Ptunnel

C.

WinTunnel

D.

Ethereal

Buy Now
Questions 40

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

Options:

A.

No contractors shall have access to the authorized resources.

B.

No contractors shall be permitted to scan the network.

C.

No contractors shall have access to the unauthorized resources.

D.

No contractors can access FTP unless specifically granted permissions to use it.

Buy Now
Questions 41

You work as a programmer for uCertify.Inc. You have a session object named session1 with an attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1. Which of the following will be used to retrieve Attribute1?

Options:

A.

Object obj=binding1.getSession().getAttribute("Attribute1");

B.

Object obj=binding1.getAttribute("Attribute1");

C.

Long MyAttribute=session1.getAttribute("Attribute1");

D.

Object obj=session1.getAttribute("Attribute1");

E.

String str1=session1.getAttribute("Attribute1");

Buy Now
Questions 42

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:

A.

A DNS Zone

B.

An Intranet

C.

A stub zone

D.

A demilitarized zone (DMZ)

Buy Now
Questions 43

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server: Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Options:

A.

PsPasswd

B.

WinSSLMiM

C.

PsFile

D.

UserInfo

Buy Now
Questions 44

Which of the following tools is used for port scanning?

Options:

A.

L0phtcrack

B.

NSLOOKUP

C.

NETSH

D.

Nmap

Buy Now
Questions 45

Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names. (Choose two)

Options:

A.

TCP Port 443 / S-HTTP or SSL

B.

TCP Port 80 / HTTPS or SSL

C.

TCP Port 443 / HTTPS or SSL

D.

TCP Port 80 / HTTP

Buy Now
Questions 46

An attacker wants to connect directly to an unsecured station to circumvent the AP security or to attack the station. Which of the following tools can be used to accomplish the task?

Options:

A.

Wireless card

B.

MacChanger

C.

SirMACsAlot

D.

USB adapter

Buy Now
Questions 47

Which of the following is a basic feature of the Unix operating system? (Choose three)

Options:

A.

It is highly portable across hardware.

B.

All files can be individually protected using read, write, and execute permissions for the user, group, and others.

C.

It allows all the modules to be loaded into memory.

D.

A user can execute multiple programs at the same time from a single terminal.

Buy Now
Questions 48

You work as a Network Administrator for Tech Perfect Inc. You have a laptop running Windows Vista Ultimate. You want to configure Windows Defender on your laptop so that it does not take any action automatically whenever it scans malicious software. Rather, it should recommend the action and wait for your approval for taking any action. Which of the following actions will you take to accomplish the task?

Options:

A.

Clear the Use real-time protection check box in Defender Options

B.

Clear the Automatically scan my computer check box in Defender Options

C.

Select the Create a restore point before applying action to detected items check box in Defender Options

D.

Clear the Apply default actions to items detected during a scan check box in Defender Options.

Buy Now
Questions 49

Which of the following listeners need not be configured in the deployment descriptor? (Choose two)

Options:

A.

HttpSessionBindingListener

B.

HttpSessionAttributeListener

C.

HttpSessionListener

D.

HttpSessionActivationListener

Buy Now
Questions 50

Which of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Perform Quantitative Risk Analysis

B.

Monitor and Control Risks

C.

Perform Qualitative Risk Analysis

D.

Identify Risks

Buy Now
Questions 51

Which of the following processes are involved under the COBIT framework?

Options:

A.

Managing the IT workforce.

B.

Correcting all risk issues.

C.

Conducting IT risk assessments.

D.

Developing a strategic plan.

Buy Now
Questions 52

Which of the following types of attack is described in the statement below? "It is a technique employed to compromise the security of network switches. In this attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table."

Options:

A.

Man-in-the-middle

B.

Blind spoofing

C.

Dictionary

D.

MAC flooding

Buy Now
Questions 53

Which of the following tags will create two vertical frames, as given in the image below, where the left frame is half as wide as the right one?

GSNA Question 53

Options:

A.

B.

C.

D.

E.

Buy Now
Questions 54

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Options:

A.

Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

B.

Look at the Web servers logs and normal traffic logging.

C.

Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D.

Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

Buy Now
Questions 55

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-are-secure network. Which of the following IEEE-based traffic can be sniffed with Kismet?

Options:

A.

802.11g

B.

802.11n

C.

802.11b

D.

802.11a

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Jun 30, 2025
Questions: 368

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now GSNA testing engine

PDF (Q&A)

$31.5  $104.99
buy now GSNA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 05 Jul 2025