Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSNA - GIAC Systems and Network Auditor

Page: 9 / 11
Total 368 questions

You have been assigned a project to develop a Web site for a construction company. You plan to develop a Web site and want to get more control over the appearance and presentation of the Web pages. You also want to increase your ability to precisely specify the position and appearance of the elements on a page and create special effects. You plan to use cascading style sheets (CSS). You want to define styles only for the active page. Which type of style sheet will you use?

A.

Embedded Style Sheet

B.

Inline Style Sheet

C.

Internal Style Sheet

D.

External Style Sheet

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently backed up his entire Linux hard drive into the my_backup.tgz file. The size of the my_backup.tgz file is 800MB. Now, he wants to break this file into two files in which the size of the first file named my_backup.tgz.aa should be 600MB and that of the second file named my_backup.tgz.ab should be 200MB. Which of the following commands will John use to accomplish his task?

A.

split --verbose -b 200m my_backup.tgz my_backup.tgz

B.

split --verbose -b 200m my_backup.tgz my_backup.tgz

C.

split --verbose -b 600m my_backup.tgz my_backup.tgz

D.

split --verbose -b 600m my_backup.tgz my_backup.tgz

Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?

A.

tac

B.

tr

C.

cat

D.

less

From an auditing perspective, database security can be broken down into four key categories: Server Security Database Connections Table Access Control Restricting Database Access Which of the following categories leads to the process of limiting access to the database server?

A.

Table access control

B.

Database connections

C.

Restricting database access

D.

Server security

Which of the following are the countermeasures against WEP cracking?

A.

Using the longest key supported by hardware.

B.

Changing keys often.

C.

Using a non-obvious key.

D.

Using a 16 bit SSID.

Which of the following statements is NOT true about FAT16 file system?

A.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

B.

FAT16 file system supports file-level compression.

C.

FAT16 does not support file-level security.

D.

FAT16 file system supports Linux operating system.

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection? (Choose two)

A.

Hardening the server OS

B.

Using either WEP or WPA encryption

C.

MAC filtering on the router

D.

Strong password policies on workstations.

E.

Not broadcasting SSID

You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchase books using their credit cards. You want to ensure that only the administrator can access the credit card information sent by users. Which security mechanism will you use to accomplish the task?

A.

Confidentiality

B.

Data integrity

C.

Authentication

D.

Authorization

Which of the following records is the first entry in a DNS database file?

A.

CNAME

B.

SOA

C.

SRV

D.

MX

Which of the following are attributes of the

tag? (Choose three)

A.

BORDER

B.

ALIGN

C.

TD

D.

WIDTH

tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the
tag is used to set the width of the table border. Answer: C is incorrect.
is not an attribute of the tag. It is a tag used to specify cells in a table.