Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSNA - GIAC Systems and Network Auditor

Page: 2 / 11
Total 368 questions

Which of the following Windows processes supports creating and deleting processes and threads, running 16-bit virtual DOS machine processes, and running console windows?

A.

smss.exe

B.

services.exe

C.

csrss.exe

D.

System

You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

A.

A network-based application layer firewall

B.

Host-based application firewall

C.

An application firewall

D.

Stateful firewall

Which of the following statements about session tracking is true?

A.

When using cookies for session tracking, there is no restriction on the name of the session tracking cookie.

B.

When using cookies for session tracking, the name of the session tracking cookie must be jsessionid.

C.

A server cannot use cookie as the basis for session tracking.

D.

A server cannot use URL rewriting as the basis for session tracking.

Mark works as a project engineer in Tech Perfect Inc. His office is configured with Windows XP-based computers. The computer that he uses is not configured with a default gateway. He is able to access the Internet, but is not able to use e-mail services via the Internet. However, he is able to access e-mail services via the intranet of the company. Which of the following could be the reason of not being able to access e-mail services via the Internet?

A.

Proxy server

B.

IP packet filter

C.

Router

D.

Protocols other than TCP/IP

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint. Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

A.

nmap -sS

B.

nmap -sU -p

C.

nmap -O -p

D.

nmap -sT Explanation:

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Single Loss Expectancy (SLE)

B.

Annualized Rate of Occurrence (ARO)

C.

Exposure Factor (EF)

D.

Safeguard

You have to move the whole directory /foo to /bar. Which of the following commands will you use to accomplish the task?

A.

mv /bar /foo

B.

mv -R /foo /bar

C.

mv /foo /bar

D.

mv -r /bar /foo

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Which of the following types of firewall functions at the Session layer of OSI model?

A.

Packet filtering firewall

B.

Circuit-level firewall

C.

Switch-level firewall

D.

Application-level firewall

Which of the following wireless security features provides the best wireless security mechanism?

A.

WEP

B.

WPA with 802.1X authentication

C.

WPA

D.

WPA with Pre Shared Key