Pass4itsure > GIAC > GIAC Certifications > GSNA > GSNA Online Practice Questions and Answers

GSNA Online Practice Questions and Answers

Questions 4

You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. The company needs to provide secure network access. You have configured a firewall to prevent certain ports and applications from forwarding the packets to the company's intranet.

What does a firewall check to prevent these ports and applications from forwarding the packets to the intranet?

A. The network layer headers and the session layer port numbers

B. The application layer port numbers and the transport layer headers

C. The transport layer port numbers and the application layer headers

D. The presentation layer headers and the session layer port numbers

Buy Now
Questions 5

You work as a Software Developer for UcTech Inc. You want to encode a URL, so that it can be used with the sendRedirect() method to send the response to the client. In order to accomplish this, you have to use a method of the HttpServletResponse interface.

Which of the following methods will you use?

A. encodeResponseURL()

B. encodeRedirectURL()

C. encodeURL()

D. encodeURLResponse()

Buy Now
Questions 6

Which of the following internal control components provides the foundation for the other components and encompasses such factors as management's philosophy and operating style?

A. Information and communication

B. Risk assessment

C. Control activities

D. Control environment

Buy Now
Questions 7

Martha works as a Web Developer for XYZ CORP. She is developing a Web site for the company. In the Web site, she uses multiple and overlapping style definitions to control the appearance of HTML elements.

What is this technique known as?

A. Style sheet

B. Cascading Style Sheet

C. Overlapping Style Sheet

D. Core sheet

Buy Now
Questions 8

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has a data.txt file in which each column is separated by the TAB character. Now, he wants to use this file as input for a data mining software he has created. The problem preventing him from accomplishing his task is that with his data mining software, he has used TAB as a delimiter to distinguish between columns. Hence, he is unable to use this file as input for the software. However, if he somehow replaces the TAB characters of the file with SPACE characters, he can use this file as an input file for his data mining software.

Which of the following commands will John use to replace the TAB characters of the file with SPACE characters?

A. expand -t 1 data.txt > data.txt

B. cat data.txt

C. chmod 755 data.txt

D. touch data.txt

Buy Now
Questions 9

Which of the following commands can be used to find out where commands are located?

A. type

B. which

C. env

D. ls

Buy Now
Questions 10

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

A. Warkitting

B. War driving

C. Wardialing

D. Demon dialing

Buy Now
Questions 11

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail.

Which of the following techniques is he performing to accomplish his task?

A. Web ripping

B. Steganography

C. Email spoofing

D. Social engineering

Buy Now
Questions 12

Samantha works as a Web Developer for XYZ CORP. She develops a Web application using Visual InterDev. She wants to group a series of HTML elements together so that an action can be performed collectively on them.

Which of the following tags will Samantha use to accomplish this?

A. DIV

B. GROUP

C. BODY

D. SPAN

Buy Now
Questions 13

Which of the following is a basic feature of the Unix operating system? (Choose three) A. It is highly portable across hardware.

B. All files can be individually protected using read, write, and execute permissions for the user, group, and others.

C. It allows all the modules to be loaded into memory.

D. A user can execute multiple programs at the same time from a single terminal.

Buy Now
Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor (GSNA)
Last Update: Jan 04, 2025
Questions: 413
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99