Download GIAC.PracticeDumps.GSNA.2018-07-24.1e.238q.vcex

Exam GIAC Systems and Network Auditor
Number GSNA
File Name GIAC.PracticeDumps.GSNA.2018-07-24.1e.238q.vcex
Size 1.47 Mb
Posted August 07, 2018


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1

You work as the Project Engineer for XYZ CORP. The company has a Unix-based network. Your office consists of one server, seventy client computers, and one print device. You raise a request for printing a confidential page. After 30 minutes, you find that your print request job is not processed and is at the seventh position in the printer queue. You analyze that it shall take another one hour to print. You decide to remove your job from the printer queue and get your page printed outside the office.  
Which of the following Unix commands can you use to remove your job from the printer queue?

  • A: tunelp
  • B: pr
  • C: lprm
  • D: gs
Question 2

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk.  
Which of the following Unix commands can you use to accomplish the task?

  • A: swapon
  • B: tune2fs
  • C: swapoff
  • D: sync
Question 3

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server. You want to secure the server so that only authorized users can access it.  
What will you do to accomplish this?

  • A: Disable anonymous authentication.
  • B: Stop the FTP service on the server.
  • C: Disable the network adapter on the server.
  • D: Enable anonymous authentication.
Question 4

Which of the following statements about a perimeter network are true? (Choose three)

  • A: It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall.
  • B: It has a connection to a private network through an external firewall and a connection to an internal network through an interior firewall.
  • C: It is also known as a demilitarized zone or DMZ.
  • D: It prevents access to the internal corporate network for outside users.
Question 5

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

  • A: He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.
  • B: He should restore his Windows settings.
  • C: He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.
  • D: He should upgrade his antivirus program.
Question 6

In addition to denying and granting access, what other services does a firewall support?

  • A: Network Access Translation (NAT)
  • B: Secondary connections
  • C: Control Internet access based on keyword restriction
  • D: Data caching
Question 7

Which of the following are the goals of risk management? (Choose three)

  • A: Identifying the risk
  • B: Assessing the impact of potential threats
  • C: Finding an economic balance between the impact of the risk and the cost of the countermeasure
  • D: Identifying the accused
Question 8

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company.  
Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network? (Choose two)

  • A: WPA2 -EAP
  • B: WPA-PSK
  • C: WEP
  • D: WPA-EAP
Question 9

Which of the following mechanisms is closely related to authorization?

  • A: Sending secret data such as credit card information.
  • B: Allowing access to a particular resource.
  • C: Verifying username and password.
  • D: Sending data so that no one can alter it on the way.
Question 10

An auditor assesses the database environment before beginning the audit. This includes various key tasks that should be performed by an auditor to identify and prioritize the users, data, activities, and applications to be monitored.  
Which of the following tasks need to be performed by the auditor manually?

  • A: Classifying data risk within the database systems
  • B: Monitoring data changes and modifications to the database structure, permission and user changes, and data viewing activities
  • C: Analyzing access authority
  • D: Archiving, analyzing, reviewing, and reporting of audit information