Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSNA - GIAC Systems and Network Auditor

Page: 8 / 11
Total 368 questions

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

A.

Gathering private and public IP addresses

B.

Collecting employees information

C.

Performing Neotracerouting

D.

Banner grabbing

Which of the following statements about URL rewriting are true?

A.

If cookies are supported by the browser, URL rewriting will return the URL unchanged.

B.

The request.encodeRedirectURL() method is used to add a session id info to the URL and send the request to another URL.

C.

The request.encodeURL() method is used to add a session id info to the URL.

D.

URL rewriting is used in cases where cookies are not supported by the browser.

You work as the Network Administrator for a company. You configure a Windows 2000-based computer as the Routing and Remote Access server, so that users can access the company's network, remotely. You want to log a record of all the users who access the network by using Routing and Remote Access. What will you do to log all the logon activities?

A.

On the Routing and Remote Access server, enable log authentication requests in auditing, and define the path for the log file in Remote Access Logging.

B.

On the Routing and Remote Access server, enable log authentication requests in Remote Access Logging.

C.

On the Routing and Remote Access server, enable log authentication requests in auditing.

D.

Do nothing as the Windows 2000-based Routing and Remote Access server automatically creates a log record for each connection attempt.

You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task. Which of the following actions will you perform to accomplish the task?

A.

Create a scheduled task to download definition files for Windows Defender every Sunday.

B.

Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

C.

Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

D.

Click the arrow beside the Help button Click the Check for updates option.

Which of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."

A.

Perform Quantitative Risk Analysis

B.

Monitor and Control Risks

C.

Perform Qualitative Risk Analysis

D.

Identify Risks

You work as the Network Administrator for XYZ CORP. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see first five lines of the file /etc/passwd. Which of the following commands should you use to accomplish the task?

A.

head -n 5 /etc/passwd

B.

head 5 -n /etc/passwd

C.

tail -n 5 /etc/passwd

D.

head /etc/passwd

Which of the following are known as safety critical software?

A.

Software that is used to apply a critical decision-making process

B.

Software that manages safety critical data including display of safety critical information

C.

Software that intervenes when a safe condition is present or is about to happen

D.

Software that is used to create safety critical functions

Which of the following statements are true about MS-CHAPv2?

A.

It is a connectionless protocol.

B.

It provides an authenticator-controlled password change mechanism.

C.

It is subject to offline dictionary attacks.

D.

It can be replaced with EAP-TLS as the authentication mechanism for PPTP.

Which of the following processes are involved under the COBIT framework?

A.

Managing the IT workforce.

B.

Correcting all risk issues.

C.

Conducting IT risk assessments.

D.

Developing a strategic plan.

You work as a Software Developer for XYZ CORP. You create a SQL server database named DATA1 that will manage the payroll system of the company. DATA1 contains two tables named EmployeeData, Department. While EmployeeData records detailed information of the employees, Department stores information about the available departments in the company. EmployeeData consists of columns that include EmpID, EmpName, DtOBrth, DtOJoin, DeptNo, Desig, BasicSal, etc. You want to ensure that each employee ID is unique and is not shared between two or more employees. You also want to ensure that the employees enter only valid department numbers in the DeptNo column. Which of the following actions will you perform to accomplish the task?

A.

Define triggers in the EmployeeData table.

B.

Add stored procedures by using Transact-SQL queries.

C.

Add constraints to the EmployeeData table.

D.

Define indexes in the EmployeeData table.

E.

Define views in the database.