Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSNA - GIAC Systems and Network Auditor

Page: 7 / 11
Total 368 questions

You work as a Desktop Support Technician for XYZ CORP. The company uses a Windows-based network comprising 50 Windows XP Professional computers. You want to include the Safe Mode with Command Prompt feature into the boot.ini file of a Windows XP Professional computer. Which of the following switches will you use?

A.

/safeboot:network /sos /bootlog /noguiboot

B.

/safeboot:minimal /sos /bootlog /noguiboot

C.

/safeboot:minimal(alternateshell) /sos /bootlog /noguiboot

D.

/safeboot:dsrepair /sos

Which of the following internal control components provides the foundation for the other components and encompasses such factors as management's philosophy and operating style?

A.

Information and communication

B.

Risk assessment

C.

Control activities

D.

Control environment

Which of the following is the best way to authenticate users on the intranet?

A.

By using Forms authentication.

B.

By using Basic authentication.

C.

By using clear text.

D.

By using NT authentication.

Samantha works as a Web Developer for XYZ CORP. She develops a Web application using Visual InterDev. She wants to group a series of HTML elements together so that an action can be performed collectively on them. Which of the following tags will Samantha use to accomplish this?

A.

DIV

B.

GROUP

C.

BODY

D.

SPAN

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Web ripping

B.

Steganography

C.

Email spoofing

D.

Social engineering

Which of the following is a basic feature of the Unix operating system? (Choose three)

A.

It is highly portable across hardware.

B.

All files can be individually protected using read, write, and execute permissions for the user, group, and others.

C.

It allows all the modules to be loaded into memory.

D.

A user can execute multiple programs at the same time from a single terminal.

You work as a Software Developer for UcTech Inc. You want to encode a URL, so that it can be used with the sendRedirect() method to send the response to the client. In order to accomplish this, you have to use a method of the HttpServletResponse interface. Which of the following methods will you use?

A.

encodeResponseURL()

B.

encodeRedirectURL()

C.

encodeURL()

D.

encodeURLResponse()

What will be the output of the following command? echo $(date %M) > date.txt

A.

The current time (Month) will be written in the date.txt file.

B.

It will create a variable $(date %M).

C.

It will print a string "date %M".

D.

The current time (Minutes) will be written in the date.txt file.

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.5

D.

IEEE 802.11b

You want to monitor the network infrastructure of a software-based company. The network infrastructure of the company consists of the following: Windows TCP/IP services Web and mail servers URLs Applications (MS Exchange, SQL etc.) Which of the following network monitoring solutions can you use to accomplish the task?

A.

Axence nVision

B.

CommandCenter NOC

C.

Netmon

D.

Cymphonix Network Composer