Limited-Time Offer: Enjoy 60% Savings! - Ends In 0d 00h 00m 00s Coupon code: 60OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Most Recent GIAC GSNA Exam Questions & Answers


Prepare for the GIAC Systems and Network Auditor exam with our extensive collection of questions and answers. These practice Q&A are updated according to the latest syllabus, providing you with the tools needed to review and test your knowledge.

QA4Exam focus on the latest syllabus and exam objectives, our practice Q&A are designed to help you identify key topics and solidify your understanding. By focusing on the core curriculum, These Questions & Answers helps you cover all the essential topics, ensuring you're well-prepared for every section of the exam. Each question comes with a detailed explanation, offering valuable insights and helping you to learn from your mistakes. Whether you're looking to assess your progress or dive deeper into complex topics, our updated Q&A will provide the support you need to confidently approach the GIAC GSNA exam and achieve success.

The questions for GSNA were last updated on Jan 20, 2025.
  • Viewing page 1 out of 83 pages.
  • Viewing questions 1-5 out of 416 questions
Get All 416 Questions & Answers
Question No. 1

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

Each correct answer represents a complete solution. Choose all that apply.

Show Answer Hide Answer
Correct Answer: B, C, D

There are different portions that can be included in the firewall policy. These portions include the acceptable use statement, the network connection statement, the contracted worker statement, and the firewall administrator statement. The contracted worker statement portion of the policy is related to the contracted or the temporary workers. It states the rights and permissions for these workers. Some of the items hat can be included in this portion are as follows:

No contractors can use FTP unless specifically granted to use it.

No contractors shall have access to TELNET unless specifically granted to use it.

No contractors shall have access to unauthorized resources.

No contractors shall have access to scan the network.

Answer A is incorrect. Only authorized resources should be accessed by the contractors.


Question No. 2

You work as a Network Administrator for Blue Well Inc. The company has a TCP/IP-based routed network. Two segments have been

configured on the network as shown below:

One day, the switch in Subnet B fails. What will happen?

Each correct answer represents a complete solution. Choose all that apply.

Show Answer Hide Answer
Correct Answer: A, D

According to the question, the network is a routed network where two segments have been divided and each segment has a switch. These

switches are connected to a common router. All workstations in a segment are connected to their respective subnet's switches. Failure of the

switch in Subnet B will make all workstations connected to it offline. Moreover, communication between the two subnets will be affected, as

there will be no link to connect to Subnet B.


Question No. 3

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

Show Answer Hide Answer
Correct Answer: B, C, D

The following methods can be helpful to eliminate social engineering threat:

Password policies

Vulnerability assessments

Data classification

Password policy should specify that how the password can be shared.

Company should implement periodic penetration and vulnerability assessments. These assessments usually consist of using known hacker

tools and common hacker techniques to breach a network security. Social engineering should also be used for an accurate assessment.

Since social engineers use the knowledge of others to attain information, it is essential to have a data classification model in place that all

employees know and follow. Data classification assigns level of sensitivity of company information. Each classification level specifies that who

can view and edit data, and how it can be shared.


Question No. 4

Fill in the blank with the appropriate term.

When two routers are used in a firewall configuration, the internal router is known as a .

Correct

Show Answer Hide Answer
Correct Answer: A

interior router present in the screened host firewall architecture. It is attached to the perimeter network and protects the internal network

from the Internet and the perimeter net.

A choke router is basically employed for the job of packet filtering for the firewall. It is also used to provide access to selected services that

are outbound from the internal net to the Internet. These services may include outgoing Telnet, FTP, WAIS, Archie, Gopher, etc.


Question No. 5

You work as a Desktop Support Technician for uCertify Inc. The company uses a Windows-based network comprising 50 Windows XP

Professional computers. You want to include the Safe Mode with Command Prompt feature into the boot.ini file of a Windows XP Professional

computer. Which of the following switches will you use?

Show Answer Hide Answer
Correct Answer: C

Safe-mode boot switches are used in the Windows operating systems to use the afe-mode boot feature. To use this feature the user should

press F8 during boot. These modes are available in the Boot.ini file. Users can also automate the boot process using this feature. Various

switches used for various modes are given below:


Unlock All Questions for GIAC GSNA Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 416 Questions & Answers