Leads4pass > GIAC > GIAC Information Security > GNSA > GNSA Online Practice Questions and Answers

GNSA Online Practice Questions and Answers

Questions 4

Which of the following statements about the traceroute utility are true?

A. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

B. It records the time taken for a round trip for each packet at each router.

C. It is an online tool that performs polymorphic shell code attacks.

D. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

Buy Now
Questions 5

You work as a Network Administrator for XYZ CORP. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks: The wireless network communication should be secured. The laptop users should be able to use smart cards for getting authenticated. In order to accomplish the tasks, you take the following steps: Configure 802.1x and WEP for the wireless connections. Configure the PEAP-MS-CHAP v2 protocol for authentication.

What will happen after you have taken these steps?

A. Both tasks will be accomplished.

B. The laptop users will be able to use smart cards for getting authenticated.

C. The wireless network communication will be secured.

D. None of the tasks will be accomplished.

Buy Now
Questions 6

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

A. Magic Lantern

B. KeyGhost Keylogger

C. Alchemy Remote Executor

D. SocketShield

Buy Now
Questions 7

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card? (Choose two)

A. These tools can determine the rogue access point even when it is attached to a wired network.

B. These tools can determine the authorization status of an access point.

C. These tools cannot detect rogue access points if the victim is using data encryption.

D. These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

Buy Now
Questions 8

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department.

What security risk does this present?

A. None, adding a wireless access point is a common task and not a security risk.

B. It is likely to increase network traffic and slow down network performance.

C. This circumvents network intrusion detection.

D. An unauthorized WAP is one way for hackers to get into a network.

Buy Now
Questions 9

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

A. Change hub with switch.

B. Deploying a powerful antenna.

C. Disabling SSID broadcast.

D. Implement WEP.

Buy Now
Questions 10

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

A. The network layer headers and the session layer port numbers

B. The transport layer port numbers and the application layer headers

C. The application layer port numbers and the transport layer headers

D. The presentation layer headers and the session layer port numbers

Buy Now
Questions 11

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

A. Command injection attack

B. Code injection attack

C. Cross-Site Scripting attack

D. Cross-Site Request Forgery

Buy Now
Questions 12

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute.

Which of the following Unix configuration files can you use to accomplish the task?

A. /proc/meminfo

B. /etc/sysconfig/amd

C. /proc/modules

D. /etc/sudoers

Buy Now
Questions 13

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company.

Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

A. No contractors shall have access to the authorized resources.

B. No contractors shall be permitted to scan the network.

C. No contractors shall have access to the unauthorized resources.

D. No contractors can access FTP unless specifically granted permissions to use it.

Buy Now
Exam Code: GNSA
Exam Name: GIAC Systems and Network Auditor
Last Update: Feb 25, 2025
Questions: 412
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99