Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSNA GIAC Systems and Network Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSNA GIAC Systems and Network Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 6
Total 368 questions

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

A.

Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B.

Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C.

Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D.

Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Which of the following services are provided by the proxy servers?

A.

Intrusion detection

B.

Logging

C.

Hiding network resources

D.

Caching

Which of the following commands can be used to format text files?

A.

wc

B.

ps

C.

tail

D.

pr

Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the company. In the Web site, she uses multiple and overlapping style definitions to control the appearance of HTML elements. What is this technique known as?

A.

Style sheet

B.

Cascading Style Sheet

C.

Overlapping Style Sheet

D.

Core sheet

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

A.

Implement WPA

B.

Implement WEP

C.

Don't broadcast SSID

D.

Implement MAC filtering

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?

A.

Network mapper

B.

Protocol analyzer

C.

A port scanner

D.

Packet sniffer

You are the Security Administrator for an Internet Service Provider. From time to time your company gets subpoenas from attorneys and law enforcement for records of customers' access to the internet. What policies must you have in place to be prepared for such requests?

A.

Group access policies

B.

Backup policies

C.

User access policies

D.

Storage and retention policies

Which of the following encryption encoding techniques is used in the basic authentication method?

A.

HMAC_MD5

B.

Md5

C.

DES (ECB mode)

D.

Base64

Which of the following statements about a screened host is true?

A.

It facilitates a more efficient use of the Internet connection bandwidth and hides the real IP addresses of computers located behind the proxy.

B.

It is a small network that lies in between the Internet and a private network.

C.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

D.

It provides a physical connection between computers within a network.

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. You run the following command for a router interface: show interface serial0 You get the following output: Serial0 is administratively down, line protocol is down What will be your conclusion after viewing this output?

A.

There is a physical problem either with the interface or the cable attached to it.

B.

The router has no power.

C.

There is a problem related to encapsulation.

D.

The interface is shut down.

You have to move the whole directory /foo to /bar. Which of the following commands will you use to accomplish the task?

A.

mv /bar /foo

B.

mv -R /foo /bar

C.

mv /foo /bar

D.

mv -r /bar /foo

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)

A.

nc 208.100.2.25 23

B.

nmap -v -O www.we-are-secure.com

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

A.

Magic Lantern

B.

KeyGhost Keylogger

C.

Alchemy Remote Executor

D.

SocketShield

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

A.

Misconfigured router

B.

DoS attack

C.

Syn flood

D.

Virus

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task?

A.

swapon

B.

tune2fs

C.

swapoff

D.

sync

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. You have installed a Windows Server 2008 computer. You have configured auditing on this server. The client computers of the company use the Windows XP Professional operating system. You want to audit each event that is related to a user managing an account in the user database on the computer where the auditing is configured. To accomplish the task, you have enabled the Audit account management option on the server. Which of the following events can be audited by enabling this audit option?

A.

Access to an Active Directory object

B.

Change of password for a user account

C.

Addition of a user account to a group

D.

Creation of a user account

Which of the following tools is used to make fake authentication certificates?

A.

Obiwan

B.

Netcat

C.

WinSSLMiM

D.

Brutus

In addition to denying and granting access, what other services does a firewall support?

A.

Network Access Translation (NAT)

B.

Secondary connections

C.

Control Internet access based on keyword restriction

D.

Data caching

Page: 2 / 6
Total 368 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved