Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSNA GIAC Systems and Network Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSNA GIAC Systems and Network Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 6
Total 368 questions

You work as the Network Technician for XYZ CORP. The company has a Linux-based network. You are working on the Red Hat operating system. You want to view only the last 4 lines of a file named /var/log/cron. Which of the following commands should you use to accomplish the task?

A.

tail -n 4 /var/log/cron

B.

tail /var/log/cron

C.

cat /var/log/cron

D.

head /var/log/cron

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

A.

The network layer headers and the session layer port numbers

B.

The transport layer port numbers and the application layer headers

C.

The application layer port numbers and the transport layer headers

D.

The presentation layer headers and the session layer port numbers

Which of the following are the countermeasures against WEP cracking?

A.

Using the longest key supported by hardware.

B.

Changing keys often.

C.

Using a non-obvious key.

D.

Using a 16 bit SSID.

Pervasive IS controls can be used across all the internal departments and external contractors to define the direction and behavior required for the technology to function properly. When these controls are implemented properly, which of the following areas show the reliability improvement? (Choose three)

A.

Hardware development

B.

Software development

C.

Security administration

D.

Disaster recovery

Which of the following are the drawbacks of the NTLM Web authentication scheme?

A.

The password is sent in hashed format to the Web server.

B.

It works only with Microsoft Internet Explorer.

C.

The password is sent in clear text format to the Web server.

D.

It can be brute forced easily.

You work as a Web Developer for XYZ CORP. The company has a Windows-based network. You have been assigned the task to secure the website of the company. To accomplish the task, you want to use a website monitoring service. What are the tasks performed by a website monitoring service?

A.

It checks the health of various links in a network using end-to-end probes sent by agents located at vantage points in the network.

B.

It checks SSL Certificate Expiry.

C.

It checks HTTP pages.

D.

It checks Domain Name Expiry.

With reference to the given case study, one of the security goals requires to configure a secure connection between the Boston distribution center and the headquarters. You want to implement IP filter to fulfill the security requirements. How should you implement IP filters at the headquarters? (Click the Exhibit button on the toolbar to see the case study.)

A.

Add source filters for the headquarters for UDP port 1701 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

B.

Add source filters for the Boston distribution center for UDP port 80 and IP protocol 50.

Add destination filters for headquarters for UDP port 80 and IP protocol 50.

C.

Add source filters for the headquarters for UDP port 80 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 80 and IP protocol 50.

D.

Add source filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

Add destination filters for the headquarters for UDP port 1701 and IP protocol 50.

You work as a Network Administrator for XYZ CORP. The company's Windows 2000 network is configured with Internet Security and Acceleration (ISA) Server 2000. ISA Server is configured as follows: The server uses the default site and content rule and default IP packet filters. Packet filtering is enabled. The server has two protocol rules:

Users in the network complain that they are unable to access secure Web sites. However, they are able to connect to Web sites in which secure transmission is not required. What is the most likely cause?

A.

A protocol rule that allows the use of HTTP has not been created.

B.

An IP packet filter that allows the use of network traffic on port 80 has not been created.

C.

An IP packet filter that allows the use of network traffic on port 443 has not been created.

D.

A protocol rule that allows the use of HTTPS has not been created.

Which of the following statements are true about security risks? (Choose three)

A.

They can be removed completely by taking proper actions.

B.

They are considered an indicator of threats coupled with vulnerability.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They can be analyzed and measured by the risk analysis process.

From an auditing perspective, database security can be broken down into four key categories: Server Security Database Connections Table Access Control Restricting Database Access Which of the following categories leads to the process of limiting access to the database server?

A.

Table access control

B.

Database connections

C.

Restricting database access

D.

Server security

Which of the following commands can be used to find out where commands are located?

A.

type

B.

which

C.

env

D.

ls

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

You work as a Software Developer for UcTech Inc. You want to ensure that a class is informed whenever an attribute is added, removed, or replaced in a session. Which of the following is the event that you will use to accomplish the task?

A.

HttpSessionBindingEvent

B.

HttpAttributeEvent

C.

HttpSessionEvent

D.

HttpSessionAttributeEvent

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

A.

DSniff

B.

Dig

C.

Host

D.

NSLookup

Which of the following are attributes of the

tag? (Choose three)

A.

BORDER

B.

ALIGN

C.

TD

D.

WIDTH

tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the
tag is used to set the width of the table border. Answer: C is incorrect.
is not an attribute of the tag. It is a tag used to specify cells in a table.

You work as a Network Administrator for XYZ CORP. The company has a small TCP/IP-based network environment. The network contains a Cisco Catalyst 6000 family switch. A few sales people come to your outer office and use your local network to access the Internet, as well as to demonstrate their products. What will you do to prevent your network from being accessed by any outside computers?

A.

Configure port security.

B.

Configure a firewall for IP blocking on the network.

C.

Configure a firewall for MAC address blocking on the network.

D.

Configure a port scanner.

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

A.

Examining your antivirus logs

B.

Examining your domain controller server logs

C.

Examining your firewall logs

D.

Examining your DNS Server logs

Samantha works as a Web Developer for XYZ CORP. She is designing a Web site for the company. In a Web page, she uses the HTTP-EQUIV attribute to control the page cache. Which of the following HTTP-EQUIV values controls the page cache in the browser folder?

A.

Window-target

B.

Status-code

C.

Content-type

D.

Pragma

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer? (Choose two)

A.

SSID of the WLAN

B.

WEP key

C.

IP address of the router

D.

MAC address of the router

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. You use DumpSec as an auditing and reporting program for security issues. Which of the following statements is true about DumpSec? (Choose three)

A.

It obtains the DACLs for the registry.

B.

It dumps user and group information.

C.

It collates the DACLs for the file system.

D.

It kills the running services in the Windows environment.

Page: 4 / 6
Total 368 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved