Pass4itsure > GIAC > GIAC Information Security > GSNA > GSNA Online Practice Questions and Answers

GSNA Online Practice Questions and Answers

Questions 4

Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah wants greater control over the appearance and presentation of Web pages. She wants the ability to precisely specify the display attributes and the appearance of elements on the Web pages.

How will she accomplish this?

A. Use the Database Design wizard.

B. Make two templates, one for the index page and the other for all other pages.

C. Use Cascading Style Sheet (CSS).

D. Make a template and use it to create each Web page.

Buy Now
Questions 5

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A. Non-operational audit

B. Dependent audit

C. Independent audit

D. Operational audit

Buy Now
Questions 6

Which of the following mechanisms is closely related to authorization?

A. Sending secret data such as credit card information.

B. Allowing access to a particular resource.

C. Verifying username and password.

D. Sending data so that no one can alter it on the way.

Buy Now
Questions 7

You work as a Network Administrator for TechPerfect Inc. The company has a secure wireless network. Since the company's wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool.

Which of the following statements are true about NetStumbler?

A. It can be integrated with the GPS.

B. It cannot identify the channel being used.

C. It can identify the SSIDs.

D. It works with a wide variety of cards.

Buy Now
Questions 8

John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company.

Which of the following can be the purpose of this analysis? (Choose three)

A. To ensure absolute safety during the audit

B. To analyze exposure to risk in order to support better decision-making and proper management of those risks

C. To try to quantify the possible impact or loss of a threat

D. To assist the auditor in identifying the risks and threats

Buy Now
Questions 9

On which of the following does a CGI program execute?

A. Router

B. Web server

C. Client

D. Client and Web server

Buy Now
Questions 10

Which of the following statements about Secure Sockets Layer (SSL) are true? (Choose two)

A. It provides connectivity between Web browser and Web server.

B. It provides mail transfer service.

C. It provides communication privacy, authentication, and message integrity.

D. It uses a combination of public key and symmetric encryption for security of data.

Buy Now
Questions 11

You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security.

Which of the following devices would you use to accomplish the task?

A. Proxy server

B. IDS

C. Packet filtering firewall

D. honeypot

Buy Now
Questions 12

Which of the following are the drawbacks of the NTLM Web authentication scheme?

A. The password is sent in hashed format to the Web server.

B. It works only with Microsoft Internet Explorer.

C. The password is sent in clear text format to the Web server.

D. It can be brute forced easily.

Buy Now
Questions 13

What are the purposes of audit records on an information system? (Choose two)

A. Upgradation

B. Backup

C. Troubleshooting

D. Investigation

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Apr 20, 2024
Questions: 413
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99