Pass4itsure > GIAC > GIAC Information Security > GNSA > GNSA Online Practice Questions and Answers

GNSA Online Practice Questions and Answers

Questions 4

HOTSPOT

George works as an Office Assistance in TechSoft Inc. All client computers in the company run Windows Vista operating system. He has turned on the Windows Firewall for security purposes. He prepares a document and wants to share it

with other users of the company. When he tries to share the document, he gets a message that firewall has blocked the sharing of the files on his computer. He wants to ensure that that the firewall does not block sharing of the document. He

opens Windows Firewall dialog box.

What actions will he perform in the dialog box to accomplish the task?

Hot Area:

Buy Now
Questions 5

HOTSPOT

You work as a Network Administrator for uCertify Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. All clients on the network run Windows 2000 Professional. The

company policy prevents you from installing the Firewall Client software or configuring the Web Proxy service on any client computer. You configure access policy rules to allow all the users to use the HTTP protocol for accessing all Internet

sites. However, users on the network report that they are unable to do so.

Mark the option that is configured incorrectly.

Hot Area:

Buy Now
Questions 6

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it.

Which of the following risks may occur due to the existence of these problems?

A. Residual risk

B. Inherent risk

C. Secondary risk

D. Detection risk

Buy Now
Questions 7

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.

Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

A. nmap -sS

B. nmap -sU -p

C. nmap -O -p

D. nmap -sT

Buy Now
Questions 8

Web mining allows a user to look for patterns in data through content mining, structure mining, and usage mining.

What is the function of structure mining?

A. To examine data collected by search engines

B. To examine data collected by Web spiders

C. To examine data related to the structure of a particular Web site

D. To examine data related to a particular user's browser

Buy Now
Questions 9

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

A. Warkitting

B. War driving

C. Wardialing

D. Demon dialing

Buy Now
Questions 10

Which of the following are the disadvantages of Dual-Homed Host Firewall Architecture?

A. It can provide services by proxying them.

B. It can provide a very low level of control.

C. User accounts may unexpectedly enable services a user may not consider secure.

D. It provides services when users log on to the dual-homed host directly.

Buy Now
Questions 11

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute.

Which of the following Unix configuration files can you use to accomplish the task?

A. /proc/meminfo

B. /etc/sysconfig/amd

C. /proc/modules

D. /etc/sudoers

Buy Now
Questions 12

Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?

A. tac

B. tr

C. cat

D. less

Buy Now
Questions 13

Fill in the blank with the appropriate command.

You want to search the most recent command that starts with the string 'user'. For this, you will enter the ________ command to get the desired result.

A. history !user

Buy Now
Exam Code: GNSA
Exam Name: GIAC Systems and Network Auditor
Last Update: Apr 25, 2025
Questions: 412
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99