Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

GIAC GSNA GIAC Systems and Network Auditor Exam Practice Test

Demo: 55 questions
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 1

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Question 2

You work as a Software Developer for UcTech Inc. You want to encode a URL, so that it can be used with the sendRedirect() method to send the response to the client. In order to accomplish this, you have to use a method of the HttpServletResponse interface. Which of the following methods will you use?

Options:

A.

encodeResponseURL()

B.

encodeRedirectURL()

C.

encodeURL()

D.

encodeURLResponse()

Question 3

You want to monitor the network infrastructure of a software-based company. The network infrastructure of the company consists of the following: Windows TCP/IP services Web and mail servers URLs Applications (MS Exchange, SQL etc.) Which of the following network monitoring solutions can you use to accomplish the task?

Options:

A.

Axence nVision

B.

CommandCenter NOC

C.

Netmon

D.

Cymphonix Network Composer

Question 4

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to check the status of the printer and set its state. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

banner

B.

lpq

C.

lpc

D.

lpr

Question 5

Brutus is a password cracking tool that can be used to crack the following authentications: HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 (Post Office Protocol v3) FTP (File Transfer Protocol) SMB (Server Message Block) Telnet Which of the following attacks can be performed by Brutus for password cracking?

Options:

A.

Man-in-the-middle attack

B.

Hybrid attack

C.

Replay attack

D.

Brute force attack

E.

Dictionary attack

Question 6

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. The Manager of the company requires Mark to use tables instead of frames in the Web site. What is the major advantage that a table-structured Web site has over a frame-structured Web site?

Options:

A.

Easy maintenance

B.

Speed

C.

Better navigation

D.

Capability of being bookmarked or added to the Favorites folder

Question 7

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mke2fs

B.

mkswap

C.

mkfs

D.

hdparm

Question 8

You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task. Which of the following actions will you perform to accomplish the task?

Options:

A.

Create a scheduled task to download definition files for Windows Defender every Sunday.

B.

Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

C.

Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

D.

Click the arrow beside the Help button Click the Check for updates option.

Question 9

Which of the following statements is true about the Digest Authentication scheme?

Options:

A.

A valid response from the client contains a checksum of the username, the password, the given random value, the HTTP method, and the requested URL.

B.

In this authentication scheme, the username and password are passed with every request, not just when the user first types them.

C.

The password is sent over the network in clear text format.

D.

It uses the base64 encoding encryption scheme.

Question 10

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Options:

A.

Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

B.

Look at the Web servers logs and normal traffic logging.

C.

Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D.

Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

Question 11

You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You want to take a snapshot of the router running configuration and archive running configuration of the router to persistent storage. Which of the following steps will you take?

Options:

A.

Secure the boot configuration

B.

Restore an archived primary bootset

C.

Verify the security of the bootset

D.

Enable the image resilience

Question 12

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

NetBIOS NULL session

B.

DNS zone transfer

C.

IIS buffer overflow

D.

SNMP enumeration

Question 13

Which of the following statements is true about COLSPAN attribute?

Options:

A.

COLSPAN is used to create columns in a table.

B.

COLSPAN is used to divide one column into many columns.

C.

COLSPAN is used to span one column across many rows.

D.

COLSPAN is used to span one column across many columns.

Question 14

In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. Which of the following categories of audit standards established by GAAS are related to professional and technical competence, independence, and professional due care?

Options:

A.

Reporting standards

B.

Risk Analysis standards

C.

General standards

D.

Field work standards

Question 15

Which of the following is an enterprise-grade network/application/performance monitoring platform that tightly integrates with other smart building management systems, such as physical access control, HVAC, lighting, and time/attendance control?

Options:

A.

Airwave Management Platform

B.

Andrisoft WANGuard Platform

C.

akk@da

D.

Aggregate Network Manager

Question 16

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of specific types of packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It is used to store information about confidential data.

Question 17

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Options:

A.

TIS authentication

B.

Kerberos authentication

C.

Rhosts (rsh-style) authentication

D.

Password-based authentication

Question 18

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

Options:

A.

Change hub with switch.

B.

Deploying a powerful antenna.

C.

Disabling SSID broadcast.

D.

Implement WEP.

Question 19

Which of the following statements about the /etc/profile file are true?

Options:

A.

It allows a system administrator to create a default home directory for all new users on a computer.

B.

A user can change the settings of the /etc/profile file, but he cannot delete the file. It can only be deleted by the root user.

C.

It can change the default umask value.

D.

It is used to configure and control system-wide default variables.

Question 20

You work as a Software Developer for UcTech Inc. You are building a Web site that will contain study materials on the Java language. The company wants that members can access all the pages, but non-members have only limited access to the Web site pages. Which of the following security mechanisms will you use to accomplish the task?

Options:

A.

Data integrity

B.

Authentication

C.

Confidentiality

D.

Authorization

Question 21

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Options:

A.

DSniff

B.

Dig

C.

Host

D.

NSLookup

Question 22

Which of the following statements are true about security risks? (Choose three)

Options:

A.

They can be removed completely by taking proper actions.

B.

They are considered an indicator of threats coupled with vulnerability.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They can be analyzed and measured by the risk analysis process.

Question 23

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.

Examining your antivirus logs

B.

Examining your domain controller server logs

C.

Examining your firewall logs

D.

Examining your DNS Server logs

Question 24

Which of the following statements about data integrity of a container are true? (Choose two)

Options:

A.

It ensures that a hacker cannot alter the contents of an HTTP message while it is in transit from a container to a client.

B.

Data integrity ensures that information is made available to users who are authorized to access it.

C.

Data integrity ensures that information has not been modified by a third party while it is in transit.

D.

It ensures that an eavesdropper cannot read an HTTP message being sent from a client to a container.

Question 25

Which of the following aaa accounting commands should be used to enable logging of both the start and stop records for user terminal sessions on the router?

Options:

A.

aaa accounting auth proxy start-stop tacacs+

B.

aaa accounting system none tacacs+

C.

aaa accounting connection start-stop tacacs+

D.

aaa accounting exec start-stop tacacs+

Question 26

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Eavesdropping

B.

Fingerprinting

C.

Web ripping

D.

TCP FTP proxy scanning

Question 27

You work as a Software Developer for UcTech Inc. You want to ensure that a class is informed whenever an attribute is added, removed, or replaced in a session. Which of the following is the event that you will use to accomplish the task?

Options:

A.

HttpSessionBindingEvent

B.

HttpAttributeEvent

C.

HttpSessionEvent

D.

HttpSessionAttributeEvent

Question 28

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Protective controls

B.

Reactive controls

C.

Detective controls

D.

Preventive controls

Question 29

Which of the following is a method of the HttpSession interface and is used to retrieve the time when the session was created?

Options:

A.

getCreationTime()

B.

getSessionCreationTime()

C.

getSessionTime()

D.

getTime()

Question 30

Choose the benefits of deploying switches over hubs in your infrastructure. (Choose two)

Options:

A.

Layer 2 switches allow for the creation of Virtual LANs providing options for further segmentation and security.

B.

Switches lower the number of collisions in the environment.

C.

Switches create an environment best suited for half duplex communications. This improves network performance and the amount of available bandwidth.

D.

Layer 2 switches increase the number of broadcast domains in the environment.

Question 31

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

Options:

A.

Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B.

Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C.

Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D.

Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Question 32

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. A user is unable to access the Internet from Host B. You also verify that Host B is not able to connect to other resources on the network. The IP configuration of Host B is shown below:

Which of the following is the most likely cause of the issue?

Options:

A.

An incorrect subnet mask is configured on Host B.

B.

The IP address of Host B is not from the correct IP address range of the network.

C.

There is an IP address conflict on the network.

D.

An incorrect default gateway is configured on Host B.

Question 33

Which of the following services are provided by the proxy servers?

Options:

A.

Intrusion detection

B.

Logging

C.

Hiding network resources

D.

Caching

Question 34

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:

A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Question 35

You are the Security Consultant and you frequently do vulnerability assessments on client computers. You want to have a standardized approach that would be applicable to all of your clients when doing a vulnerability assessment. What is the best way to do this?

Options:

A.

Utilize OVAL.

B.

Create your own standard and use it with all clients.

C.

Utilize each client's security policies when doing a vulnerability assessment for that client.

D.

Utilize the Microsoft security recommendations.

Question 36

You work as an IT Technician for XYZ CORP. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

Options:

A.

RAS

B.

MAC Filtering

C.

SSID

D.

WEP

Question 37

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WPA

B.

Implement WEP

C.

Don't broadcast SSID

D.

Implement MAC filtering

Question 38

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:

A.

A DNS Zone

B.

An Intranet

C.

A stub zone

D.

A demilitarized zone (DMZ)

Question 39

You work as a Network Administrator for Tech-E-book Inc. You are configuring the ISA Server 2006 firewall to provide your company with a secure wireless intranet. You want to accept inbound mail delivery though an SMTP server. What basic rules of ISA Server do you need to configure to accomplish the task.

Options:

A.

Publishing rules

B.

Network rules

C.

Mailbox rules

D.

Access rules

Question 40

The following output is generated by running the show ip route command: RouterA#show ip route < - - Output Omitted for brevity - -> Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:

A.

192.168.10.0

B.

172.18.60.1

C.

172.18.50.1

D.

172.18.1.1

Question 41

Mike works as a Network Engineer for XYZ CORP. The company has a multi-platform network. Recently, the company faced lots of blended threat issues that lead to several drastic attacks. Mike has been assigned a project to manage the resources and services of the company through both Intranet and Internet to protect the company from these attacks. Mike needs a system that provides auto-discovering and network topology building features to allow him to keep an intuitive view of the IT infrastructure. What will Mike use to meet the requirement of the project?

Options:

A.

eBox

B.

dopplerVUe

C.

David system

D.

EM7

Question 42

The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path. In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?

Options:

A.

Load

B.

MTU

C.

Hop count

D.

Bandwidth

Question 43

You work as a Network Administrator for Tech Perfect Inc. For security issues, the company requires you to harden its routers. You therefore write the following code: Router#config terminal Router(config) #no ip bootp server Router(config) #no ip name-server Router(config) #no ntp server Router(config) #no snmp server Router(config) #no ip http server Router(config) #^Z Router# What services will be disabled by using this configuration fragment?

Options:

A.

BootP service

B.

Finger

C.

CDP

D.

DNS function Explanation:

Question 44

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1. Original cookie values: ItemID1=2 ItemPrice1=900 ItemID2=1 ItemPrice2=200 Modified cookie values: ItemID1=2 ItemPrice1=1 ItemID2=1 ItemPrice2=1 Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price. Which of the following hacking techniques is John performing?

Options:

A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

Question 45

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

Options:

A.

20

B.

443

C.

80

D.

21

Question 46

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

Options:

A.

WEPCrack

B.

Kismet

C.

Snadboy's Revelation

D.

NetStumbler

Question 47

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? (Choose two)

Options:

A.

DNS cache poisoning

B.

DDoS attack

C.

IP spoofing attack

D.

MAC spoofing

Question 48

Which of the following controls define the direction and behavior required for technology to function properly?

Options:

A.

Detailed IS controls

B.

General controls

C.

Application controls

D.

Pervasive IS controls

Question 49

Which of the following statements about a screened host is true?

Options:

A.

It facilitates a more efficient use of the Internet connection bandwidth and hides the real IP addresses of computers located behind the proxy.

B.

It is a small network that lies in between the Internet and a private network.

C.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

D.

It provides a physical connection between computers within a network.

Question 50

George works as an office assistant in Soft Well Inc. The company uses the Windows Vista operating system. He wants to disable a program running on a computer. Which of the following Windows Defender tools will he use to accomplish the task?

Options:

A.

Allowed items

B.

Quarantined items

C.

Options

D.

Software Explorer

Question 51

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. You have installed a Windows Server 2008 computer. You have configured auditing on this server. The client computers of the company use the Windows XP Professional operating system. You want to audit each event that is related to a user managing an account in the user database on the computer where the auditing is configured. To accomplish the task, you have enabled the Audit account management option on the server. Which of the following events can be audited by enabling this audit option?

Options:

A.

Access to an Active Directory object

B.

Change of password for a user account

C.

Addition of a user account to a group

D.

Creation of a user account

Question 52

Which of the following allows the use of multiple virtual servers using different DNS names resolved by the same IP address?

Options:

A.

HTTP 1.1

B.

JAVA

C.

HTML

D.

VPN

Question 53

Mark works as a project engineer in Tech Perfect Inc. His office is configured with Windows XP-based computers. The computer that he uses is not configured with a default gateway. He is able to access the Internet, but is not able to use e-mail services via the Internet. However, he is able to access e-mail services via the intranet of the company. Which of the following could be the reason of not being able to access e-mail services via the Internet?

Options:

A.

Proxy server

B.

IP packet filter

C.

Router

D.

Protocols other than TCP/IP

Question 54

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

Options:

A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Question 55

You have an online video library. You want to upload a directory of movies. Since this process will take several hours, you want to ensure that the process continues even after the terminal is shut down or session is closed. What will you do to accomplish the task?

Options:

A.

Use the bg command to run the process at the background.

B.

Add the nohup command in front of the process.

C.

Add the nohup command at the end of the process.

D.

Run the process inside a GNU Screen-style screen multiplexer.

Demo: 55 questions
Total 368 questions