Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSNA - GIAC Systems and Network Auditor

Page: 10 / 11
Total 368 questions

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

A.

The network layer headers and the session layer port numbers

B.

The transport layer port numbers and the application layer headers

C.

The application layer port numbers and the transport layer headers

D.

The presentation layer headers and the session layer port numbers

Which of the following methods is used to get a cookie from a client? Note: Here, request is a reference of type HttpServletRequest, and response is a reference of type HttpServletResponse.

A.

Cookie [] cookies = request.getCookies();

B.

Cookie [] cookies = request.getCookie(String str)

C.

Cookie [] cookies = response.getCookie(String str)

D.

Cookie [] cookies = response.getCookies()

You have been assigned a project to develop a Web site for a construction company. You have to develop a Web site and want to get more control over the appearance and presentation of your Web pages. You also want to increase the ability to precisely specify the location and appearance of the elements on a page and create special effects. You plan to use Cascading style sheets (CSS). You want to apply the same style consistently throughout your Web site. Which type of style sheet will you use?

A.

Internal Style Sheet

B.

External Style Sheet

C.

Inline Style Sheet

D.

Embedded Style Sheet

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

A.

Change hub with switch.

B.

Deploying a powerful antenna.

C.

Disabling SSID broadcast.

D.

Implement WEP.

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

A.

Reverse social engineering attack

B.

Impersonation attack

C.

Important user posing attack

D.

In person attack

You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You have mplemented four VPN connections in the network. You use the Cisco IOS on the network. Which feature will you enable to maintain a separate routing and forwarding table for each VPN?

A.

Intrusion Prevention System

B.

VRF-aware firewall

C.

Virtual Private Network

D.

Stateful firewall

You work as a Network Administrator for XYZ CORP. The company's Windows 2000 network is configured with Internet Security and Acceleration (ISA) Server 2000. ISA Server is configured as follows: The server uses the default site and content rule and default IP packet filters. Packet filtering is enabled. The server has two protocol rules:

Users in the network complain that they are unable to access secure Web sites. However, they are able to connect to Web sites in which secure transmission is not required. What is the most likely cause?

A.

A protocol rule that allows the use of HTTP has not been created.

B.

An IP packet filter that allows the use of network traffic on port 80 has not been created.

C.

An IP packet filter that allows the use of network traffic on port 443 has not been created.

D.

A protocol rule that allows the use of HTTPS has not been created.

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to impose some special access restrictions on users. Which of the following Unix configuration files can you use to accomplish the task?

A.

/var/run/utmp

B.

/etc/terminfo

C.

/etc/usertty

D.

/etc/termcap

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer? (Choose two)

A.

SSID of the WLAN

B.

WEP key

C.

IP address of the router

D.

MAC address of the router

You work as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. You have used the LogMiner feature for auditing purposes. Which of the following files store a copy of the data dictionary? (Choose two)

A.

Online redo log files

B.

Operating system flat file

C.

Dump file

D.

Control file