Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSNA GIAC Systems and Network Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSNA GIAC Systems and Network Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 368 questions

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection? (Choose two)

A.

Hardening the server OS

B.

Using either WEP or WPA encryption

C.

MAC filtering on the router

D.

Strong password policies on workstations.

E.

Not broadcasting SSID

Zorp is a proxy firewall suite developed by Balabit IT Security. Which of the following statements are true about Zorp?

A.

It allows the administrators to fine-tune proxy decisions.

B.

Zorp aims for compliance with the Common Criteria/Application Level Firewall Protection Profile for Medium Robustness.

C.

It allows full analysis of embedded protocols.

D.

The GPL version of Zorp lacks much of the usability and functions from the other versions.

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to track the system for user logins. To accomplish the task, you need to analyze the log configuration files. Which of the following Unix log configuration files can you use to accomplish the task?

A.

/var/log/messages

B.

/var/log/secure

C.

/var/spool/mail

D.

/var/log/maillog

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You want to configure the ACL with a Cisco router. Which of the following router prompts can you use to accomplish the task?

A.

router(config-if)#

B.

router(config)#

C.

router(config-ext-nacl)#

D.

router#

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

A.

mke2fs

B.

mkswap

C.

mkfs

D.

hdparm

Andrew works as a Network Administrator for Infonet Inc. The company has a Windows 2003 domain-based network. The network has five Windows 2003 member servers and 150 Windows XP Professional client computers. One of the member servers works as an IIS server. The IIS server is configured to use the IP address 142.100.10.6 for Internet users and the IP address 16.5.7.1 for the local network. Andrew wants the server to allow only Web communication over the Internet. He also wants to enable the local network users to access the shared folders and other resources. How will Andrew configure the IIS server to accomplish this? (Choose three)

A.

Enable the IP packet filter.

B.

Permit all the ports on the network adapter that uses the IP address 142.100.10.6.

C.

Permit only port 25 on the network adapter that uses the IP address 142.100.10.6.

D.

Permit all the ports on the network adapter that uses the IP address 16.5.7.1.

E.

Permit only port 80 on the network adapter that uses the IP address 142.100.10.6.

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

A.

It uses password hash for client authentication.

B.

It uses a public key certificate for server authentication.

C.

It is supported by all manufacturers of wireless LAN hardware and software.

D.

It provides a moderate level of security.

Which of the following are the disadvantages of Dual-Homed Host Firewall Architecture?

A.

It can provide services by proxying them.

B.

It can provide a very low level of control.

C.

User accounts may unexpectedly enable services a user may not consider secure.

D.

It provides services when users log on to the dual-homed host directly.

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute. Which of the following Unix configuration files can you use to accomplish the task?

A.

/proc/meminfo

B.

/etc/sysconfig/amd

C.

/proc/modules

D.

/etc/sudoers

You work as a Software Developer for UcTech Inc. You want to encode a URL, so that it can be used with the sendRedirect() method to send the response to the client. In order to accomplish this, you have to use a method of the HttpServletResponse interface. Which of the following methods will you use?

A.

encodeResponseURL()

B.

encodeRedirectURL()

C.

encodeURL()

D.

encodeURLResponse()

You want to monitor the network infrastructure of a software-based company. The network infrastructure of the company consists of the following: Windows TCP/IP services Web and mail servers URLs Applications (MS Exchange, SQL etc.) Which of the following network monitoring solutions can you use to accomplish the task?

A.

Axence nVision

B.

CommandCenter NOC

C.

Netmon

D.

Cymphonix Network Composer

Which of the following methods can be helpful to eliminate social engineering threat? (Choose three)

A.

Data encryption

B.

Data classification

C.

Password policies

D.

Vulnerability assessments

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP based switched network. A root bridge has been elected in the switched network. You have installed a new switch with a lower bridge ID than the existing root bridge. What will happen?

A.

The new switch starts advertising itself as the root bridge.

B.

The new switch divides the network into two broadcast domains.

C.

The new switch works as DR or BDR.

D.

The new switch blocks all advertisements.

Which of the following statements are true about MS-CHAPv2?

A.

It is a connectionless protocol.

B.

It provides an authenticator-controlled password change mechanism.

C.

It is subject to offline dictionary attacks.

D.

It can be replaced with EAP-TLS as the authentication mechanism for PPTP.

Brutus is a password cracking tool that can be used to crack the following authentications: HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 (Post Office Protocol v3) FTP (File Transfer Protocol) SMB (Server Message Block) Telnet Which of the following attacks can be performed by Brutus for password cracking?

A.

Man-in-the-middle attack

B.

Hybrid attack

C.

Replay attack

D.

Brute force attack

E.

Dictionary attack

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

A.

Dynamic key encryption

B.

Public key certificate for server authentication

C.

Strongest security level

D.

Password hash for client authentication

Which of the following statements about system hardening are true? (Choose two)

A.

It is used for securing the computer hardware.

B.

It can be achieved by installing service packs and security updates on a regular basis.

C.

It can be achieved by locking the computer room.

D.

It is used for securing an operating system.

Which of the following are known as safety critical software?

A.

Software that is used to apply a critical decision-making process

B.

Software that manages safety critical data including display of safety critical information

C.

Software that intervenes when a safe condition is present or is about to happen

D.

Software that is used to create safety critical functions

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

A.

httprint

B.

ServerMask

C.

Whisker

D.

WinSSLMiM

Which of the following statements are true about WPA?

A.

WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.

B.

Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.

C.

WPA-PSK converts the passphrase into a 256-bit key.

D.

WPA provides better security than WEP.

Page: 5 / 6
Total 368 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved