Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > GIAC > GIAC Certifications > GSNA > GSNA Online Practice Questions and Answers

GSNA Online Practice Questions and Answers

Questions 4

DRAG DROP

John works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating system. He installs an application on his computer. The application is not running properly. Therefore, he wants to

disable the application.

What steps will he take to accomplish the task?

Select and Place:

Buy Now

Correct Answer:

John will click the Disable button in the Software Explorer page to Disable the application running on his computer.

Windows Defender is a software product designed by Microsoft to provide continuous security against malware. If it detects anything suspicious, an alert will appear on the screen. Windows Defender can also be used to scan a computer for

suspicious software. It can remove or quarantine any malware or spyware it finds.

The Quarantined items link will open the Quarantined items page that will help a user to remove or restore software that Windows Defender has prevented from running.

The Allowed items link will open the Allowed items page that will help a user to view software that are not monitored with Windows Defender.

Questions 5

DRAG DROP

A wireless network uses multiple modulation schemes to make the signal strong so that it can travel far. These modulation schemes work with a certain IEEE standard. Choose and drop the correct standards in the right pane according to the modulation scheme.

Select and Place:

Buy Now

Correct Answer:

The modulation schemes and IEEE standards working with these modulation schemes are given below:

Questions 6

DRAG DROP

You work as a Software Developer for UcTech Inc. You create a session object and want that it be destroyed if it is not called for 20 minutes.

Drag and drop the appropriate statements that you will use to accomplish the task.

Select and Place:

Buy Now

Correct Answer:

Session timeout is an event that occurs when a session is invalidated if a user does not use the session for a specified period of time. Session timeout can be set in the following two ways:

1.Setting timeout in deployment descriptor: This can be done by specifying timeout between the tags as follows:

10 This will set the time for session timeout to ten minutes. 2.Setting timeout programmatically: This will set the timeout for a specific session. The syntax for setting the timeout programmatically is as follows: session.setMaxInactiveInterval(10*60) In this method, the timeout is specified in seconds. Hence, this will set the time for session timeout to ten minutes.

Questions 7

HOTSPOT

In the image of the Screened Host Firewall Architecture given below, select the element that is commonly known as the choke router.

Hot Area:

Buy Now

Correct Answer:

A choke router is an interior router present in the screened host firewall architecture. It is attached to the perimeter network and protects the internal network from the Internet and the perimeter net.

A choke router is basically employed for the job of packet filtering for the firewall. It is also used to provide access to selected services that are outbound from the internal net to the Internet. These services may include outgoing Telnet, FTP,

WAIS, Archie, Gopher, etc.

A Screened Host Firewall Architecture is used to provide services from a host that is attached only to the internal network by using a separate router. In this type of firewall architecture, the key security is provided by packet filtering.

The host exists in the internal network. The packet filtering on the screening router is configured in such a way that the bastion host is the only system in the internal network that is open to the Internet connections. If any external system tries

to access internal systems or services, then it will connect only to this host. The bastion host therefore needs to be at a high level of security.

Questions 8

Which of the following statements about the traceroute utility are true?

A. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

B. It records the time taken for a round trip for each packet at each router.

C. It is an online tool that performs polymorphic shell code attacks.

D. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

Buy Now

Correct Answer: AB

Traceroute is a route-tracing utility that displays the path an IP packet takes to reach its destination. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host. This tool also records the time taken for a round trip for each packet at each router that can be used to find any faulty router along the path. Answer: C, D are incorrect. Traceroute does not perform polymorphic shell code attacks. Attacking tools such as AD Mutate are used to perform polymorphic shell code attacks.

Questions 9

Which of the following statements about session tracking is true?

A. When using cookies for session tracking, there is no restriction on the name of the session tracking cookie.

B. When using cookies for session tracking, the name of the session tracking cookie must be jsessionid.

C. A server cannot use cookie as the basis for session tracking.

D. A server cannot use URL rewriting as the basis for session tracking.

Buy Now

Correct Answer: B

If you are using cookies for session tracking, the name of the session tracking cookie must be jsessionid. A jsessionid can be placed only inside a cookie header. You can use HTTP cookies to store information about a session. The servlet container takes responsibility of generating the session ID, making a new cookie object, associating the session ID into the cookie, and setting the cookie as part of response.

Questions 10

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? (Choose two)

A. DNS cache poisoning

B. DDoS attack

C. IP spoofing attack

D. MAC spoofing

Buy Now

Correct Answer: CD

Either IP spoofing or MAC spoofing attacks can be performed to hide the identity in the network. MAC spoofing is a hacking technique of changing an assigned Media Access Control (MAC) address of a networked device to a different one. The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer. MAC spoofing is the activity of altering the MAC address of a network card. Answer: A is incorrect. DNS cache poisoning is a maliciously created or unintended situation that provides data to a caching name server that did not originate from authoritative Domain Name System (DNS) sources. Once a DNS server has received such non-authentic data, Caches it for future performance increase, it is considered poisoned, supplying the non-authentic data to the clients of the server. To perform a cache poisoning attack, the attacker exploits a flaw in the DNS software. If the server does not correctly validate DNS responses to ensure that they are from an authoritative source, the server will end up caching the incorrect entries locally and serve them to other users that make the same request. Answer: B is incorrect. In a distributed denial of service (DDOS) attack, an attacker uses multiple computers throughout the network that has been previously infected. Such computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic. The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. TFN, TRIN00, etc. are tools used for a DDoS attack.

Questions 11

In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route.

What are the benefits of using a static route?

A. It is a fault tolerant path.

B. It reduces load on routers, as no complex routing calculations are required.

C. It reduces bandwidth usage, as there is no excessive router traffic.

D. It provides precise control over the routes that packets will take across the network.

Buy Now

Correct Answer: BCD

Static routing is a data communication concept that describes a way to configure path selection of routers in computer networks. This is achieved by manually adding routes to the routing table. However, when there is a change in the network

or a failure occurs between two statically defined nodes, traffic will not be rerouted.

Static routing is beneficial in many ways:

Precise control over the routes that a packet will take across the network Reduced load on the routers, as no complex routing calculations are required Reduced bandwidth use, as there is no excessive router traffic.

Easy to configure in small networks

Answer: A is incorrect. This is a property of a dynamic route. A static route cannot choose the best path. It can only choose the paths that are manually entered. When there is a change in the network or a failure occurs between two statically

defined nodes, traffic will not be rerouted.

Questions 12

What will be the output of the following command? echo $(date %M) > date.txt

A. The current time (Month) will be written in the date.txt file.

B. It will create a variable $(date %M).

C. It will print a string "date %M".

D. The current time (Minutes) will be written in the date.txt file.

Buy Now

Correct Answer: D

The date command with the %M specifier prints the current time (Minutes). Since the output is redirected towards the date.txt file, the current time (Minutes) will be printed in the date.txt file.

Questions 13

You work as a Software Developer for UcTech Inc. You want to create a new session.

Which of the following methods can you use to accomplish the task?

A. getNewSession(true)

B. getSession(false)

C. getSession()

D. getSession(true)

E. getNewSession()

Buy Now

Correct Answer: CD

The getSession() method of the HttpServletRequest interface returns the current session associated with the request, or creates a new session if no session exists. The method has two syntaxes as follows:

1.

public HttpSession getSession(): This method creates a new session if it does not exist.

2.

public HttpSession getSession(boolean create): This method becomes similar to the above method if create is true, and returns the current session if create is false. It returns null if no session exists. Answer: B is incorrect. The getSession (false) method returns a pre-existing session. It returns null if the client has no session associated with it.

Exam Code: GSNA
Exam Name: GIAC Systems and Network Auditor (GSNA)
Last Update: Jun 10, 2025
Questions: 413

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.