GIAC GSNA - GIAC Systems and Network Auditor Exam

Page:    1 / 83   
Total 413 questions

Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah wants greater control over the appearance and presentation of Web pages. She wants the ability to precisely specify the display attributes and the appearance of elements on the Web pages.
How will she accomplish this?

  • A. Use the Database Design wizard.
  • B. Make two templates, one for the index page and the other for all other pages.
  • C. Use Cascading Style Sheet (CSS).
  • D. Make a template and use it to create each Web page.


Answer : C

Explanation:
Sarah should use the Cascading Style Sheet (CSS) while creating Web pages. This will give her greater control over the appearance and presentation of the Web pages and will also enable her to precisely specify the display attributes and the appearance of elements on the Web pages.

You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows
Active Directory-based single forest single domain network. You have installed a Windows Server 2008 computer. You have configured auditing on this server.
The client computers of the company use the Windows XP Professional operating system. You want to audit each event that is related to a user managing an account in the user database on the computer where the auditing is configured. To accomplish the task, you have enabled the Audit account management option on the server.
Which of the following events can be audited by enabling this audit option?

  • A. Access to an Active Directory object
  • B. Change of password for a user account
  • C. Addition of a user account to a group
  • D. Creation of a user account


Answer : BCD

Explanation:
Audit account management is one of the nine audit settings that can be configured on a Windows computer. This option is enabled to audit each event that is related to a user managing an account in the user database on the computer where the auditing is configured. These events include the following:
-> Creating a user account
-> Adding a user account to a group
-> Renaming a user account
-> Changing password for a user account
This option is also used to audit the changes to the domain account of the domain controllers.

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step.
Which of the following commands will he use to accomplish the task? (Choose two.)

  • A. nc 208.100.2.25 23
  • B. nmap -v -O www.we-are-secure.com
  • C. nc -v -n 208.100.2.25 80
  • D. nmap -v -O 208.100.2.25


Answer : Answer: C is incorrect. "nc -v -n 208.100.2.25 80" is a Netcat command, which is used to banner grab for getting information about the system and running

Explanation:
According to the scenario, John will use "nmap -v -O 208.100.2.25" to detect the operating system of the we-are-secure server. Here, -v is used for verbose and -
O is used for TCP/IP fingerprinting to guess the remote operating system. John may also use the DNS name of we-are-secure instead of using the IP address of the we-are-secure server. So, he can also use the nmap command "nmap -v -O www.we-are-secure.com ". services.

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic.
What is this most likely to be an indicator of?

  • A. Misconfigured router
  • B. DoS attack
  • C. Syn flood
  • D. Virus


Answer : Answer: D is incorrect. Viruses can cause an increase in network traffic, and it is possible for that to be broadcast traffic. However, a DoS attack is more likely than

Explanation:
There are several denial of service (DoS) attacks that specifically use broadcast traffic to flood a targeted computer. Seeing an unexplained spike in broadcast traffic could be an indicator of an attempted denial of service attack. a virus to cause this particular problem.
However, this are cent problem, the router is unlikely to be the issue.

You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file.
Which of the following commands will you use to accomplish the task?

  • A. wc -c file1.txt >>error.txt
  • B. wc -c file1.txt 1>error.txt
  • C. wc -c file1.txt 2>error.txt
  • D. wc -c file1.txt >error.txt


Answer : Answer: B, D are incorrect.

Explanation:
According to the scenario, you will use the wc -c file1.txt 2>error.txt command to accomplish the task. The 2> operator is an error redirector, which, while running a command, redirects the error (if it exists) on the specified file.
The > or 1> redirector can be used to redirect the output of the wc -c file1.txt file to the error.txt file; however, you want to write the errors in the error.txt file, not the whole output.
The >> operator will redirect the output of the command in the same manner as the > or 1> operator. Although the >>operator will not overwrite the error.txt file, it will append the error.txt file.

Page:    1 / 83   
Total 413 questions