Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSNA GIAC Systems and Network Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSNA GIAC Systems and Network Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 368 questions

Which of the following is Microsoft's implementation of the file and application server for the Internet and private intranets?

A.

Internet Server Service (ISS)

B.

Internet Server (IS)

C.

WWW Server (WWWS)

D.

Internet Information Server (IIS)

You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?

A.

The computers and their applications should be used for organizational related activities only.

B.

Computers may not be left unattended with a user account still logged on.

C.

Applications other than those supplied or approved by the company can be installed on any computer.

D.

The installed e-mail application can only be used as the authorized e-mail service.

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

A.

20

B.

443

C.

80

D.

21

You work as the Project Engineer for XYZ CORP. The company has a Unix-based network. Your office consists of one server, seventy client computers, and one print device. You raise a request for printing a confidential page. After 30 minutes, you find that your print request job is not processed and is at the seventh position in the printer queue. You analyze that it shall take another one hour to print. You decide to remove your job from the printer queue and get your page printed outside the office. Which of the following Unix commands can you use to remove your job from the printer queue?

A.

tunelp

B.

pr

C.

lprm

D.

gs

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-are-secure network. Which of the following IEEE-based traffic can be sniffed with Kismet?

A.

802.11g

B.

802.11n

C.

802.11b

D.

802.11a

Which of the following allows the use of multiple virtual servers using different DNS names resolved by the same IP address?

A.

HTTP 1.1

B.

JAVA

C.

HTML

D.

VPN

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A.

Non-operational audit

B.

Dependent audit

C.

Independent audit

D.

Operational audit

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Mark implements a Cisco unified wireless network for Tech Perfect Inc. Which functional area of the Cisco unified wireless network architecture includes intrusion detection and prevention?

A.

Network services

B.

Wireless clients

C.

Network unification

D.

Wireless access points

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system. Which of the following Unix commands can you use to accomplish the task?

A.

e2fsck

B.

dump

C.

dumpe2fs

D.

e2label

Sam works as a Web Developer for McRobert Inc. He creates a Web site. He wants to include the following table in the Web site:

He writes the following HTML code to create the table:

1.

2.

3.

4.

5.

6.

7.

9.

11.

13.

14.

15.

17.

19.

21.

22.

8.

10.

12.

16.

18.

20.

Which of the following tags will Sam place at lines 3 and 4 to create the table?

A.

at line 3 at line 4

B.

at line 3 at line 4

C.

at line 4 at line

D.

at line 3 at line 4

Which of the following responsibilities does not come under the audit process?

A.

Reporting all facts and circumstances of the irregular and illegal acts.

B.

Planning the IT audit engagement based on the assessed level of risk.

C.

Reviewing the results of the audit procedures.

D.

Applying security policies.

Which of the following types of firewall functions at the Session layer of OSI model?

A.

Packet filtering firewall

B.

Circuit-level firewall

C.

Switch-level firewall

D.

Application-level firewall

Which of the following statements about session tracking is true?

A.

When using cookies for session tracking, there is no restriction on the name of the session tracking cookie.

B.

When using cookies for session tracking, the name of the session tracking cookie must be jsessionid.

C.

A server cannot use cookie as the basis for session tracking.

D.

A server cannot use URL rewriting as the basis for session tracking.

Which of the following tools can be used to read NetStumbler's collected data files and present street maps showing the logged WAPs as icons, whose color and shape indicates WEP mode and signal strength?

A.

Kismet

B.

StumbVerter

C.

WEPcrack

D.

NetStumbler

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You are concerned about the vulnerabilities existing in the network of the company. Which of the following can be a cause for making the network vulnerable? (Choose two)

A.

Use of well-known code

B.

Use of uncommon code

C.

Use of uncommon software

D.

Use of more physical connections

Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time. Which of the following options will he choose to accomplish the task?

A.

User cannot change password

B.

Delete temporary password at next logon

C.

User must change password at next logon

D.

Password never expires

Which of the following is a prevention-driven activity to reduce errors in the project and to help the project meet its requirements?

A.

Audit sampling

B.

Asset management

C.

Access control

D.

Quality assurance

Mark works as a Web Designer for XYZ CORP. The company has a Windows-based network. Mark creates an HTML document that gives the following error on execution: "These hypertext system features are not supported by HTML". Which of the following can be the hypertext system features that are NOT supported by HTML? (Choose three)

A.

Source tracking

B.

Typed link

C.

Hyperlink

D.

Fat link

Web mining allows a user to look for patterns in data through content mining, structure mining, and usage mining. What is the function of structure mining?

A.

To examine data collected by search engines

B.

To examine data collected by Web spiders

C.

To examine data related to the structure of a particular Web site

D.

To examine data related to a particular user's browser

Page: 3 / 6
Total 368 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved