Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSNA GIAC Systems and Network Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSNA GIAC Systems and Network Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 6
Total 368 questions

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.5

D.

IEEE 802.11b

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

A.

Transference

B.

Mitigation

C.

Acceptance

D.

Avoidance

Which of the following commands will you use to watch a log file /var/adm/messages while the log file is updating continuously?

A.

less -g /var/adm/messages

B.

tail /var/adm/messages

C.

cat /var/adm/messages

D.

tail -f /var/adm/messages

Which of the following statements about the element are true?

A.

It has as one of its sub-elements.

B.

If there is no sub-element, no HTTP method will be constrained.

C.

It can have at the most one sub-element.

D.

It is a sub-element of the element.

Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services. Which of the following are the techniques used for network mapping by large organizations? Each correct answer represents a complete solution. Choose three.

A.

Route analytics

B.

Active Probing

C.

SNMP-based approaches

D.

Packet crafting

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below: This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME. Which of the following viruses has the symptoms as the one described above?

A.

I Love You

B.

Nimda

C.

Chernobyl

D.

Melissa

You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

A.

Open up all the unused management ports.

B.

Set similar passwords for each management port.

C.

Set long session timeouts.

D.

Ignore usage of the default account settings.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

A.

NetBIOS NULL session

B.

DNS zone transfer

C.

IIS buffer overflow

D.

SNMP enumeration

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared Key authentication?

A.

Install PEAP-MS-CHAP v2

B.

Enable WEP

C.

Install Service Pack 1

D.

Install EAP-TLS.

Page: 6 / 6
Total 368 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved