Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSNA - GIAC Systems and Network Auditor

Page: 3 / 11
Total 368 questions

Which of the following is a technique for creating Internet maps? (Choose two)

A.

AS PATH Inference

B.

Object Relational Mapping

C.

Active Probing

D.

Network Quota

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. You want to run two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has executed successfully. Which of the following command sequences will John use to accomplish the task?

A.

foo; bar;

B.

foo || bar;

C.

foo | bar;

D.

foo && bar;

You have an online video library. You want to upload a directory of movies. Since this process will take several hours, you want to ensure that the process continues even after the terminal is shut down or session is closed. What will you do to accomplish the task?

A.

Use the bg command to run the process at the background.

B.

Add the nohup command in front of the process.

C.

Add the nohup command at the end of the process.

D.

Run the process inside a GNU Screen-style screen multiplexer.

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)

A.

nc 208.100.2.25 23

B.

nmap -v -O www.we-are-secure.com

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

A.

20

B.

443

C.

80

D.

21

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A.

Non-operational audit

B.

Dependent audit

C.

Independent audit

D.

Operational audit

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

A.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should upgrade his antivirus program.

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

An attacker wants to connect directly to an unsecured station to circumvent the AP security or to attack the station. Which of the following tools can be used to accomplish the task?

A.

Wireless card

B.

MacChanger

C.

SirMACsAlot

D.

USB adapter

You want to append a tar file if the on-disk version of the tar file has a modification date more recent than its copy in the tar archive. Which of the following commands will you use to accomplish the task?

A.

tar -u

B.

tar -t

C.

tar -c

D.

tar –x