Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSNA Exam Dumps - GIAC Audit GSNA Questions and Answers

Question # 44

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Reverse social engineering attack

B.

Impersonation attack

C.

Important user posing attack

D.

In person attack

Buy Now
Question # 45

You work as a Software Developer for UcTech Inc. You want to encode a URL, so that it can be used with the sendRedirect() method to send the response to the client. In order to accomplish this, you have to use a method of the HttpServletResponse interface. Which of the following methods will you use?

Options:

A.

encodeResponseURL()

B.

encodeRedirectURL()

C.

encodeURL()

D.

encodeURLResponse()

Buy Now
Question # 46

You are the Network Admin for a company. You are concerned about users having access to items they should not. Your concern is that they may inadvertently have been granted access to those resources. When conducting a user access and rights review, which of the following is most likely to show you such unintentional granting of user rights?

Options:

A.

IDS Logs

B.

Access Control Lists

C.

Server logs

D.

Group Membership

Buy Now
Question # 47

Which of the following types of authentication tokens forms a logical connection to the client computer but does not require a physical connection?

Options:

A.

Virtual token

B.

Connected token

C.

Disconnected token

D.

Contactless token

Buy Now
Question # 48

Mike works as a Network Engineer for XYZ CORP. The company has a multi-platform network. Recently, the company faced lots of blended threat issues that lead to several drastic attacks. Mike has been assigned a project to manage the resources and services of the company through both Intranet and Internet to protect the company from these attacks. Mike needs a system that provides auto-discovering and network topology building features to allow him to keep an intuitive view of the IT infrastructure. What will Mike use to meet the requirement of the project?

Options:

A.

eBox

B.

dopplerVUe

C.

David system

D.

EM7

Buy Now
Question # 49

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

Options:

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

Buy Now
Question # 50

You work as a Web Developer for XYZ CORP. The company has a Windows-based network. You have been assigned the task to secure the website of the company. To accomplish the task, you want to use a website monitoring service. What are the tasks performed by a website monitoring service?

Options:

A.

It checks the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network.

B.

It checks SSL Certificate Expiry.

C.

It checks HTTP pages.

D.

It checks Domain Name Expiry.

Buy Now
Question # 51

Data mining is a process of sorting through data to identify patterns and establish relationships. Which of the following data mining parameters looks for patterns where one event is connected to another event?

Options:

A.

Sequence or path analysis

B.

Forecasting

C.

Clustering

D.

Association

Buy Now
Question # 52

Which of the following statements are true about security risks? (Choose three)

Options:

A.

They can be removed completely by taking proper actions.

B.

They are considered an indicator of threats coupled with vulnerability.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They can be analyzed and measured by the risk analysis process.

Buy Now
Question # 53

You work as a Software Developer for UcTech Inc. You want to create a new session. Which of the following methods can you use to accomplish the task?

Options:

A.

getNewSession(true)

B.

getSession(false)

C.

getSession()

D.

getSession(true)

E.

getNewSession()

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Aug 24, 2025
Questions: 368
GSNA pdf

GSNA PDF

$25.5  $84.99
GSNA Engine

GSNA Testing Engine

$28.5  $94.99
GSNA PDF + Engine

GSNA PDF + Testing Engine

$40.5  $134.99