Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSNA Exam Dumps - GIAC Audit GSNA Questions and Answers

Question # 24

What does CSS stand for?

Options:

A.

Cascading Style Sheet

B.

Coded System Sheet

C.

Cyclic Style Sheet

D.

Cascading Style System

Buy Now
Question # 25

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company. Which of the following can be a cause for making the network vulnerable? (Choose two)

Options:

A.

Use of well-known code

B.

Use of uncommon code

C.

Use of uncommon software

D.

Use of more physical connections

Buy Now
Question # 26

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log

B.

IDS log

C.

System log

D.

Firewall log

Buy Now
Question # 27

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

Options:

A.

Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B.

Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C.

Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D.

Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Buy Now
Question # 28

You work as a Network Analyst for XYZ CORP. The company has a Unix-based network. You want to view the directories in alphabetical order. Which of the following Unix commands will you use to accomplish the task?

Options:

A.

cat

B.

chmod

C.

cp

D.

ls

Buy Now
Question # 29

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Options:

A.

Snort

B.

IDS

C.

Firewall

D.

WIPS

Buy Now
Question # 30

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

Options:

A.

Determining network range

B.

Identifying active machines

C.

Enumeration

D.

Finding open ports and applications

E.

Information gathering

Buy Now
Question # 31

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:

A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Buy Now
Question # 32

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. You use DumpSec as an auditing and reporting program for security issues. Which of the following statements is true about DumpSec? (Choose three)

Options:

A.

It obtains the DACLs for the registry.

B.

It dumps user and group information.

C.

It collates the DACLs for the file system.

D.

It kills the running services in the Windows environment.

Buy Now
Question # 33

Which of the following statements about invalidating a session is true?

Options:

A.

The getCreationTime() method can be called on an invalidated session.

B.

The invalidate() method belongs to the HttpServletRequest interface.

C.

A session can be invalidated programmatically as well as using the deployment descriptor.

D.

The getAttribute(String name) method throws an IllegalArgumentException if called on an invalidated session.

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Aug 24, 2025
Questions: 368
GSNA pdf

GSNA PDF

$25.5  $84.99
GSNA Engine

GSNA Testing Engine

$28.5  $94.99
GSNA PDF + Engine

GSNA PDF + Testing Engine

$40.5  $134.99