Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSNA Exam Dumps - GIAC Audit GSNA Questions and Answers

Question # 34

What is the purpose of Cellpadding attribute of

tag?

Options:

A.

Cellpadding is used to set the width of cell border and its content.

B.

Cellpadding is used to set the width of a table.

C.

Cellpadding is used to set the space between the cell border and its content.

D.

Cellpadding is used to set the space between two cells in a table.

Buy Now
Question # 35

Which of the following text editing tools can be used to edit text files without having to open them?

Options:

A.

less

B.

sed

C.

vi

D.

more

Buy Now
Question # 36

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You want to configure the ACL with a Cisco router. Which of the following router prompts can you use to accomplish the task?

Options:

A.

router(config-if)#

B.

router(config)#

C.

router(config-ext-nacl)#

D.

router#

Buy Now
Question # 37

In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?

Options:

A.

Xmas Tree scanning

B.

TCP FIN scanning

C.

TCP SYN scanning

D.

Bounce attack scanning

Buy Now
Question # 38

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up a honey pot

B.

Vulnerability scanning

C.

Setting up IDS

D.

Port scanning

Buy Now
Question # 39

You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?

Options:

A.

wc -c file1.txt >>error.txt

B.

wc -c file1.txt 1>error.txt

C.

wc -c file1.txt 2>error.txt

D.

wc -c file1.txt >error.txt

Buy Now
Question # 40

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes: a.War driving b.Detecting unauthorized access pointsc.Detecting causes of interference on a WLAN d.WEP ICV error trackinge.Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.

Options:

A.

THC-Scan

B.

NetStumbler

C.

Absinthe

D.

Kismet

Buy Now
Question # 41

You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

Options:

A.

Open up all the unused management ports.

B.

Set similar passwords for each management port.

C.

Set long session timeouts.

D.

Ignore usage of the default account settings.

Buy Now
Question # 42

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

Options:

A.

20

B.

443

C.

80

D.

21

Buy Now
Question # 43

You work as a Network Administrator for XYZ CORP. The company's Windows 2000 network is configured with Internet Security and Acceleration (ISA) Server 2000. ISA Server is configured as follows: The server uses the default site and content rule and default IP packet filters. Packet filtering is enabled. The server has two protocol rules:

Users in the network complain that they are unable to access secure Web sites. However, they are able to connect to Web sites in which secure transmission is not required. What is the most likely cause?

Options:

A.

A protocol rule that allows the use of HTTP has not been created.

B.

An IP packet filter that allows the use of network traffic on port 80 has not been created.

C.

An IP packet filter that allows the use of network traffic on port 443 has not been created.

D.

A protocol rule that allows the use of HTTPS has not been created.

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Aug 24, 2025
Questions: 368
GSNA pdf

GSNA PDF

$25.5  $84.99
GSNA Engine

GSNA Testing Engine

$28.5  $94.99
GSNA PDF + Engine

GSNA PDF + Testing Engine

$40.5  $134.99