Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSNA - GIAC Systems and Network Auditor

Page: 4 / 11
Total 368 questions

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

A.

Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B.

Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C.

Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D.

Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? (Choose two)

A.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

B.

Attacker can use the Ping Flood DoS attack if WZC is used.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Which of the following NFS mount options specifies whether a program using a file via an NFS connection should stop and wait for the server to come back online, if the host serving the exported file system is unavailable, or if it should report an error?

A.

intr

B.

hard or soft

C.

nfsvers=2 or nfsvers=3

D.

fsid=num

Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names. (Choose two)

A.

TCP Port 443 / S-HTTP or SSL

B.

TCP Port 80 / HTTPS or SSL

C.

TCP Port 443 / HTTPS or SSL

D.

TCP Port 80 / HTTP

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

A.

UDP

B.

RPC

C.

IDLE

D.

TCP SYN/ACK

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

In which of the following attacking methods does an attacker distribute incorrect IP address?

A.

DNS poisoning

B.

IP spoofing

C.

Mac flooding

D.

Man-in-the-middle

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Which of the following is used to execute a SQL statement from the SQL buffer?

A.

Entering an asterisk (*)

B.

Pressing [RETURN] once

C.

Pressing [RETURN] twice

D.

Entering a slash (/)

E.

Pressing [ESC] twice.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

A.

Determining network range

B.

Identifying active machines

C.

Enumeration

D.

Finding open ports and applications

E.

Information gathering