Pass4itsure > GIAC > GIAC Information Security > GNSA > GNSA Online Practice Questions and Answers

GNSA Online Practice Questions and Answers

Questions 4

Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah wants greater control over the appearance and presentation of Web pages. She wants the ability to precisely specify the display attributes and the appearance of elements on the Web pages.

How will she accomplish this?

A. Use the Database Design wizard.

B. Make two templates, one for the index page and the other for all other pages.

C. Use Cascading Style Sheet (CSS).

D. Make a template and use it to create each Web page.

Buy Now
Questions 5

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted,

it seems to be deleted from all the computers on your network.

Where would you first look to try and diagnose this problem?

A. Antivirus log

B. IDS log

C. System log

D. Firewall log

Buy Now
Questions 6

Patricia joins XYZ CORP., as a Web Developer. While reviewing the company's Web site, she finds that many words including keywords are misspelled.

How will this affect the Web site traffic?

A. Leave a bad impression on users.

B. Search engine relevancy may be altered.

C. Link exchange with other sites becomes difficult.

D. The domain name cannot be registered.

Buy Now
Questions 7

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform tests on computer files and databases?

A. Parallel Simulation

B. Generalized Audit Software (GAS)

C. Test Data

D. Custom Audit Software (CAS)

Buy Now
Questions 8

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values: ItemID1=2 ItemPrice1=900 ItemID2=1 ItemPrice2=200

Modified cookie values: ItemID1=2 ItemPrice1=1 ItemID2=1 ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

A. Cross site scripting

B. Man-in-the-middle attack

C. Cookie poisoning

D. Computer-based social engineering

Buy Now
Questions 9

You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure.

Which of the following tools can you use to accomplish the task?

A. Wget

B. WinSSLMiM

C. Whisker

D. httprint

Buy Now
Questions 10

Which of the following statements about data integrity of a container are true? (Choose two)

A. It ensures that a hacker cannot alter the contents of an HTTP message while it is in transit from a container to a client.

B. Data integrity ensures that information is made available to users who are authorized to access it.

C. Data integrity ensures that information has not been modified by a third party while it is in transit.

D. It ensures that an eavesdropper cannot read an HTTP message being sent from a client to a container.

Buy Now
Questions 11

What are the purposes of audit records on an information system? (Choose two)

A. Upgradation

B. Backup

C. Troubleshooting

D. Investigation

Buy Now
Questions 12

Sarah works as a Web Developer for XYZ CORP. She develops a Web site for the company. She uses tables in the Web site. Sarah embeds three tables within a table.

What is the technique of embedding tables within a table known as?

A. Nesting tables

B. Stacking tables

C. CSS tables

D. Horned tables

Buy Now
Questions 13

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

A. Incontrovertible

B. Corroborating

C. Direct

D. Circumstantial

Buy Now
Exam Code: GNSA
Exam Name: GIAC Systems and Network Auditor
Last Update: Apr 25, 2024
Questions: 412
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99