Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GSNA Exam Dumps - GIAC Audit GSNA Questions and Answers

Question # 4

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Options:

A.

Gathering private and public IP addresses

B.

Collecting employees information

C.

Performing Neotracerouting

D.

Banner grabbing

Buy Now
Question # 5

Which of the following statements about system hardening are true? (Choose two)

Options:

A.

It is used for securing the computer hardware.

B.

It can be achieved by installing service packs and security updates on a regular basis.

C.

It can be achieved by locking the computer room.

D.

It is used for securing an operating system.

Buy Now
Question # 6

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Buy Now
Question # 7

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/proc/meminfo

B.

/etc/sysconfig/amd

C.

/proc/modules

D.

/etc/sudoers

Buy Now
Question # 8

You work as a Software Developer for XYZ CORP. You create a SQL server database named DATA1 that will manage the payroll system of the company. DATA1 contains two tables named EmployeeData, Department. While EmployeeData records detailed information of the employees, Department stores information about the available departments in the company. EmployeeData consists of columns that include EmpID, EmpName, DtOBrth, DtOJoin, DeptNo, Desig, BasicSal, etc. You want to ensure that each employee ID is unique and is not shared between two or more employees. You also want to ensure that the employees enter only valid department numbers in the DeptNo column. Which of the following actions will you perform to accomplish the task?

Options:

A.

Define triggers in the EmployeeData table.

B.

Add stored procedures by using Transact-SQL queries.

C.

Add constraints to the EmployeeData table.

D.

Define indexes in the EmployeeData table.

E.

Define views in the database.

Buy Now
Question # 9

In an IT organization, some specific tasks require additional detailed controls to ensure that the workers perform their job correctly. What do these detailed controls specify? (Choose three)

Options:

A.

How the department handles acquisitions, security, delivery, implementation, and support of IS services

B.

How to lock a user account after unsuccessful logon attempts

C.

How output data is verified before being accepted into an application

D.

The way system security parameters are set

Buy Now
Question # 10

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

NetBIOS NULL session

B.

DNS zone transfer

C.

IIS buffer overflow

D.

SNMP enumeration

Buy Now
Question # 11

Which of the following statements about a session are true? (Choose two)

Options:

A.

The creation time can be obtained using the getSessionCreationTime() method of the HttpSession.

B.

The getAttribute() method of the HttpSession interface returns a String.

C.

The time for the setMaxInactiveInterval() method of the HttpSession interface is specified in seconds.

D.

The isNew() method is used to identify if the session is new.

Buy Now
Question # 12

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. You want to run two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has executed successfully. Which of the following command sequences will John use to accomplish the task?

Options:

A.

foo; bar;

B.

foo || bar;

C.

foo | bar;

D.

foo && bar;

Buy Now
Question # 13

Which of the following statements is true about a relational database?

Options:

A.

It is difficult to extend a relational database.

B.

The standard user and application program interface to a relational database is Programming Language (PL).

C.

It is a collection of data items organized as a set of formally-described tables.

D.

It is a set of tables containing data fitted into runtime defined categories.

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor
Last Update: Aug 24, 2025
Questions: 368
GSNA pdf

GSNA PDF

$25.5  $84.99
GSNA Engine

GSNA Testing Engine

$28.5  $94.99
GSNA PDF + Engine

GSNA PDF + Testing Engine

$40.5  $134.99