Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

GIAC GSNA GIAC Systems and Network Auditor Exam Practice Test

Page: 1 / 37
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Reverse social engineering attack

B.

Impersonation attack

C.

Important user posing attack

D.

In person attack

Question 2

You work as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. You have used the LogMiner feature for auditing purposes. Which of the following files store a copy of the data dictionary? (Choose two)

Options:

A.

Online redo log files

B.

Operating system flat file

C.

Dump file

D.

Control file

Question 3

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

Options:

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

Question 4

Which of the following is an example of penetration testing?

Options:

A.

Configuring firewall to block unauthorized traffic

B.

Implementing HIDS on a computer

C.

Simulating an actual attack on a network

D.

Implementing NIDS on a network

Question 5

In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?

Options:

A.

Xmas Tree scanning

B.

TCP FIN scanning

C.

TCP SYN scanning

D.

Bounce attack scanning

Question 6

Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time. Which of the following options will he choose to accomplish the task?

Options:

A.

User cannot change password

B.

Delete temporary password at next logon

C.

User must change password at next logon

D.

Password never expires

Question 7

Which of the following statements about data integrity of a container are true? (Choose two)

Options:

A.

It ensures that a hacker cannot alter the contents of an HTTP message while it is in transit from a container to a client.

B.

Data integrity ensures that information is made available to users who are authorized to access it.

C.

Data integrity ensures that information has not been modified by a third party while it is in transit.

D.

It ensures that an eavesdropper cannot read an HTTP message being sent from a client to a container.

Question 8

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You want to configure the ACL with a Cisco router. Which of the following router prompts can you use to accomplish the task?

Options:

A.

router(config-if)#

B.

router(config)#

C.

router(config-ext-nacl)#

D.

router#

Question 9

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

Options:

A.

The network layer headers and the session layer port numbers

B.

The transport layer port numbers and the application layer headers

C.

The application layer port numbers and the transport layer headers

D.

The presentation layer headers and the session layer port numbers

Question 10

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

Options:

A.

Warkitting

B.

War driving

C.

Wardialing

D.

Demon dialing

Question 11

Which of the following applications work as mass-emailing worms? (Choose two)

Options:

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Nimda virus

D.

Melissa virus

Question 12

Which of the following is an enterprise-grade network/application/performance monitoring platform that tightly integrates with other smart building management systems, such as physical access control, HVAC, lighting, and time/attendance control?

Options:

A.

Airwave Management Platform

B.

Andrisoft WANGuard Platform

C.

akk@da

D.

Aggregate Network Manager

Question 13

What is the purpose of Cellpadding attribute of

tag?

Options:

A.

Cellpadding is used to set the width of cell border and its content.

B.

Cellpadding is used to set the width of a table.

C.

Cellpadding is used to set the space between the cell border and its content.

D.

Cellpadding is used to set the space between two cells in a table.

Question 14

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires a database that can receive data from various types of operating systems. You want to design a multidimensional database to accomplish the task. Which of the following statements are true about a multidimensional database?

Options:

A.

It is used to optimize Online Analytical Processing (OLAP) applications.

B.

It is used to optimize data warehouse.

C.

It is rarely created using input from existing relational databases.

D.

It allows users to ask questions that are related to summarizing business operations and trends.

Question 15

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Question 16

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

swapon

B.

tune2fs

C.

swapoff

D.

sync

Question 17

Which of the following statements about a screened host is true?

Options:

A.

It facilitates a more efficient use of the Internet connection bandwidth and hides the real IP addresses of computers located behind the proxy.

B.

It is a small network that lies in between the Internet and a private network.

C.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

D.

It provides a physical connection between computers within a network.

Question 18

You have just installed a Windows 2003 server. What action should you take regarding the default shares?

Options:

A.

Disable them only if this is a domain server.

B.

Disable them.

C.

Make them hidden shares.

D.

Leave them, as they are needed for Windows Server operations.

Question 19

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. You run the following command for a router interface: show interface serial0 You get the following output: Serial0 is administratively down, line protocol is down What will be your conclusion after viewing this output?

Options:

A.

There is a physical problem either with the interface or the cable attached to it.

B.

The router has no power.

C.

There is a problem related to encapsulation.

D.

The interface is shut down.

Question 20

John works as a contract Ethical Hacker. He has recently got a project to do security checking for He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)

Options:

A.

nc 208.100.2.25 23

B.

nmap -v -O www.we-are-secure.com

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25

Question 21

Which of the following allows the use of multiple virtual servers using different DNS names resolved by the same IP address?

Options:

A.

HTTP 1.1

B.

JAVA

C.

HTML

D.

VPN

Question 22

Mark works as a project engineer in Tech Perfect Inc. His office is configured with Windows XP-based computers. The computer that he uses is not configured with a default gateway. He is able to access the Internet, but is not able to use e-mail services via the Internet. However, he is able to access e-mail services via the intranet of the company. Which of the following could be the reason of not being able to access e-mail services via the Internet?

Options:

A.

Proxy server

B.

IP packet filter

C.

Router

D.

Protocols other than TCP/IP

Question 23

You are responsible for a large network that has its own DNS servers. You periodically check the log to see if there are any problems. Which of the following are likely errors you might encounter in the log? (Choose three)

Options:

A.

The DNS server could not create FTP socket for address [IP address of server]

B.

The DNS server could not create an SMTP socket

C.

Active Directory Errors

D.

The DNS server could not create a Transmission Control Protocol (TCP) socket

E.

The DNS server could not initialize the Remote Procedure Call (RPC) service

Question 24

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform tests on computer files and databases?

Options:

A.

Parallel Simulation

B.

Generalized Audit Software (GAS)

C.

Test Data

D.

Custom Audit Software (CAS)

Question 25

Which of the following controls define the direction and behavior required for technology to function properly?

Options:

A.

Detailed IS controls

B.

General controls

C.

Application controls

D.

Pervasive IS controls

Question 26

You have recently joined as a Network Auditor in XYZ CORP. The company has a Windows-based network. You have been assigned the task to determine whether or not the company's goal is being achieved. As an auditor, which of the following tasks should you perform before conducting the data center review? Each correct answer represents a complete solution. Choose three.

Options:

A.

Review the future IT organization chart.

B.

Meet with IT management to determine possible areas of concern.

C.

Review the company's IT policies and procedures.

D.

Research all operating systems, software applications, and data center equipment operating within the data center.

Question 27

Which of the following statements are true about locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi compliant MiniPCI card? (Choose two)

Options:

A.

These tools can determine the rogue access point even when it is attached to a wired network.

B.

These tools can determine the authorization status of an access point.

C.

These tools cannot detect rogue access points if the victim is using data encryption.

D.

These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.

Question 28

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest network. You configure a new Windows Server 2008 server in the network. The new server is not yet linked to Active Directory. You are required to accomplish the following tasks: Add a new group named "Sales". Copy the "Returns" group from the older server to the new one. Rename the "Returns" group to "Revenue". View all group members, including for multiple groups/entire domain. You use Hyena to simplify and centralize all of these tasks. Which of the assigned tasks will you be able to accomplish?

Options:

A.

Copy the "Returns" group to the new server.

B.

Rename the "Returns" group to "Revenue".

C.

Add the new group named "Sales".

D.

View and manage all group members, including for multiple groups/entire domain.

Question 29

You work as a Network Analyst for XYZ CORP. The company has a Unix-based network. You want to view the directories in alphabetical order. Which of the following Unix commands will you use to accomplish the task?

Options:

A.

cat

B.

chmod

C.

cp

D.

ls

Question 30

You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security. Which of the following devices would you use to accomplish the task?

Options:

A.

Proxy server

B.

IDS

C.

Packet filtering firewall

D.

honeypot

Question 31

Which of the following statements about Secure Sockets Layer (SSL) are true? (Choose two)

Options:

A.

It provides connectivity between Web browser and Web server.

B.

It provides mail transfer service.

C.

It provides communication privacy, authentication, and message integrity.

D.

It uses a combination of public key and symmetric encryption for security of data.

Question 32

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

Options:

A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

Question 33

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He has successfully completed the following pre-attack phases while testing the security of the server: Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Options:

A.

PsPasswd

B.

WinSSLMiM

C.

PsFile

D.

UserInfo

Question 34

Which of the following NFS mount options specifies whether a program using a file via an NFS connection should stop and wait for the server to come back online, if the host serving the exported file system is unavailable, or if it should report an error?

Options:

A.

intr

B.

hard or soft

C.

nfsvers=2 or nfsvers=3

D.

fsid=num

Question 35

You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program's output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?

Options:

A.

cat

B.

more

C.

less

D.

tee

Question 36

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based Enterprise network. The company uses Cisco IOS technologies in the Enterprise network. You have enabled system message logging (syslog) service on all the routers that are currently working in the network. The syslog service provides all the reports, and important error and notification messages. You want to store all the reports and messages. Choose the locations where you can store all of these.

Options:

A.

Auxiliary

B.

Buffer

C.

Syslog server

D.

tty lines

E.

Console

Question 37

The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path. In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?

Options:

A.

Load

B.

MTU

C.

Hop count

D.

Bandwidth

Question 38

Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names. (Choose two)

Options:

A.

TCP Port 443 / S-HTTP or SSL

B.

TCP Port 80 / HTTPS or SSL

C.

TCP Port 443 / HTTPS or SSL

D.

TCP Port 80 / HTTP

Question 39

ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager. Which of the following attributes of ACID confirms that the committed data will be saved by the system such that, even in the event of a failure or system restart, the data will be available in its correct state?

Options:

A.

Durability

B.

Atomicity

C.

Isolation

D.

Consistency

Question 40

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:

A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Question 41

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

UDP

B.

RPC

C.

IDLE

D.

TCP SYN/ACK

Question 42

Mark works as a Database Administrator for MarLinc Inc. How will he execute a SQL command from the SQL buffer?

Options:

A.

Enter an asterisk (*)

B.

Enter a semicolon (;)

C.

Press [ESC] twice

D.

Press [RETURN] twice

E.

Enter a slash (/)

Question 43

Which of the following listeners need not be configured in the deployment descriptor? (Choose two)

Options:

A.

HttpSessionBindingListener

B.

HttpSessionAttributeListener

C.

HttpSessionListener

D.

HttpSessionActivationListener

Question 44

What will be the output of the following command? echo $(date %M) > date.txt

Options:

A.

The current time (Month) will be written in the date.txt file.

B.

It will create a variable $(date %M).

C.

It will print a string "date %M".

D.

The current time (Minutes) will be written in the date.txt file.

Question 45

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?

Options:

A.

Multi-Authentication

B.

Port security

C.

MAC Authentication Bypass

D.

Quality of Service (QoS)

Question 46

You are tasked with configuring your routers with a minimum security standard that includes the following: A local Username and Password configured on the router A strong privilege mode password Encryption of user passwords Configuring telnet and ssh to authenticate against the router user database Choose the configuration that best meets these requirements.

Options:

A.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4 RouterA(config-line)#login

B.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable password n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

C.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

D.

RouterA(config)#service enable-password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login user

Question 47

Which of the following statements is true about the Digest Authentication scheme?

Options:

A.

A valid response from the client contains a checksum of the username, the password, the given random value, the HTTP method, and the requested URL.

B.

In this authentication scheme, the username and password are passed with every request, not just when the user first types them.

C.

The password is sent over the network in clear text format.

D.

It uses the base64 encoding encryption scheme.

Question 48

John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linux-based network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?

Options:

A.

echo $VAR1

B.

touch VAR1

C.

export VAR1

D.

env -u VAR1

Question 49

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes: a.War driving b.Detecting unauthorized access pointsc.Detecting causes of interference on a WLAN d.WEP ICV error trackinge.Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.

Options:

A.

THC-Scan

B.

NetStumbler

C.

Absinthe

D.

Kismet

Question 50

What are the purposes of audit records on an information system? (Choose two)

Options:

A.

Upgradation

B.

Backup

C.

Troubleshooting

D.

Investigation

Question 51

Which of the following backup sites takes the longest recovery time?

Options:

A.

Mobile backup site

B.

Warm site

C.

Cold site

D.

Hot site

Question 52

In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route. What are the benefits of using a static route?

Options:

A.

It is a fault tolerant path.

B.

It reduces load on routers, as no complex routing calculations are required.

C.

It reduces bandwidth usage, as there is no excessive router traffic.

D.

It provides precise control over the routes that packets will take across the network.

Question 53

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:

A.

NTLM authentication

B.

Digest authentication

C.

Microsoft Passport authentication

D.

Basic authentication

Question 54

Which of the following statements about system hardening are true? (Choose two)

Options:

A.

It is used for securing the computer hardware.

B.

It can be achieved by installing service packs and security updates on a regular basis.

C.

It can be achieved by locking the computer room.

D.

It is used for securing an operating system.

Question 55

You are the project manager of a Web development project. You want to get information about your competitors by hacking into their computers. You and the project team determine should the hacking attack not be performed anonymously, you will be traced. Hence, you hire a professional hacker to work on the project. This is an example of what type of risk response?

Options:

A.

Transference

B.

Mitigation

C.

Acceptance

D.

Avoidance

Page: 1 / 37
Total 368 questions