Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSNA GIAC Systems and Network Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSNA GIAC Systems and Network Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 368 questions

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows: C.\whisker.pl -h target_IP_address -- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address = Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22 + 200 OK: HEAD /cgi-bin/printenv John recognizes /cgi-bin/printenv vulnerability ( 'Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

A.

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

B.

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

D.

This vulnerability helps in a cross site scripting attack.

Which of the following statements about Secure Sockets Layer (SSL) are true? (Choose two)

A.

It provides connectivity between Web browser and Web server.

B.

It provides mail transfer service.

C.

It provides communication privacy, authentication, and message integrity.

D.

It uses a combination of public key and symmetric encryption for security of data.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

A.

Determining network range

B.

Identifying active machines

C.

Enumeration

D.

Finding open ports and applications

E.

Information gathering

Mike works as a Network Engineer for XYZ CORP. The company has a multi-platform network. Recently, the company faced lots of blended threat issues that lead to several drastic attacks. Mike has been assigned a project to manage the resources and services of the company through both Intranet and Internet to protect the company from these attacks. Mike needs a system that provides auto-discovering and network topology building features to allow him to keep an intuitive view of the IT infrastructure. What will Mike use to meet the requirement of the project?

A.

eBox

B.

dopplerVUe

C.

David system

D.

EM7

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

A.

UDP

B.

RPC

C.

IDLE

D.

TCP SYN/ACK

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

A.

By setting up a DMZ.

B.

You cannot, you need an IDS.

C.

By examining your domain controller server logs.

D.

By examining your firewall logs.

A sequence number is a 32-bit number ranging from 1 to 4,294,967,295. When data is sent over the network, it is broken into fragments (packets) at the source and reassembled at the destination system. Each packet contains a sequence number that is used by the destination system to reassemble the data packets in the correct order. The Initial Sequence Number of your computer is 24171311 at login time. You connect your computer to a computer having the IP address 210.213.23.21. This whole process takes three seconds. What will the value of the Initial Sequence Number be at this moment?

A.

24171811

B.

24619311

C.

24171111

D.

24171311

Peter works as a Web Developer for XYZ CORP. He is developing a Web site for the company. Peter specifies MARGINHEIGHT="0" and MARGINWIDTH="0" in one of the Web pages. How will this affect the Web page?

A.

It will create a borderless page structure when viewed in any browser.

B.

It will create a borderless page structure when viewed in Netscape Navigator.

C.

It will delete all the text from the margins.

D.

It will create a borderless page structure when viewed in Internet Explorer.

Which of the following tools can be used by a user to hide his identity?

A.

War dialer

B.

IPchains

C.

Proxy server

D.

Rootkit

E.

Anonymizer

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. A user is unable to access the Internet from Host B. You also verify that Host B is not able to connect to other resources on the network. The IP configuration of Host B is shown below:

Which of the following is the most likely cause of the issue?

A.

An incorrect subnet mask is configured on Host B.

B.

The IP address of Host B is not from the correct IP address range of the network.

C.

There is an IP address conflict on the network.

D.

An incorrect default gateway is configured on Host B.

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based Enterprise network. The company uses Cisco IOS technologies in the Enterprise network. You have enabled system message logging (syslog) service on all the routers that are currently working in the network. The syslog service provides all the reports, and important error and notification messages. You want to store all the reports and messages. Choose the locations where you can store all of these.

A.

Auxiliary

B.

Buffer

C.

Syslog server

D.

tty lines

E.

Console

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

A.

A DNS Zone

B.

An Intranet

C.

A stub zone

D.

A demilitarized zone (DMZ)

The following output is generated by running the show ip route command: RouterA#show ip route < - - Output Omitted for brevity - -> Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

A.

192.168.10.0

B.

172.18.60.1

C.

172.18.50.1

D.

172.18.1.1

You work as an IT Technician for XYZ CORP. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

A.

RAS

B.

MAC Filtering

C.

SSID

D.

WEP

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

Which of the following techniques can be used to determine the network ranges of any network?

A.

Whois query

B.

SQL injection

C.

Snooping

D.

Web ripping

A Cisco router can have multiple connections to networks. These connections are known as interfaces for Cisco Routers. For naming each interface, Cisco generally uses the type of interface as part of the name. Which of the following are true about the naming conventions of Cisco Router interfaces?

A.

An interface connected to a serial connection always starts with an S.

B.

An interface connected to a Token Ring segment always starts with To.

C.

An Ethernet interface that is fast always starts with an F.

D.

An interface connected to an Ethernet segment of the network always starts with an En.

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a dat a.txt file, 200MB in size, into two files in which the size of the first file named data.txt.aa should be 150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command: split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt Which of the following commands can John use to join the splitted files into a new data.txt file?

A.

vi data.txt.* > data.txt

B.

less data.txt.* > data.txt

C.

vi data.txt.*

D.

cat data.txt.* > data.txt

Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?

A.

149 and 133

B.

203 and 333

C.

139 and 445

D.

198 and 173

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the secure terminals from where the root can be allowed to log in. Which of the following Unix configuration files can you use to accomplish the task?

A.

/etc/services

B.

/etc/ioports

C.

/proc/interrupts

D.

/etc/securetty

Page: 1 / 6
Total 368 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved