Prepare for the GIAC Systems and Network Auditor exam with our extensive collection of questions and answers. These practice Q&A are updated according to the latest syllabus, providing you with the tools needed to review and test your knowledge.
QA4Exam focus on the latest syllabus and exam objectives, our practice Q&A are designed to help you identify key topics and solidify your understanding. By focusing on the core curriculum, These Questions & Answers helps you cover all the essential topics, ensuring you're well-prepared for every section of the exam. Each question comes with a detailed explanation, offering valuable insights and helping you to learn from your mistakes. Whether you're looking to assess your progress or dive deeper into complex topics, our updated Q&A will provide the support you need to confidently approach the GIAC GSNA exam and achieve success.
You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?
Each correct answer represents a complete solution. Choose all that apply.
There are different portions that can be included in the firewall policy. These portions include the acceptable use statement, the network connection statement, the contracted worker statement, and the firewall administrator statement. The contracted worker statement portion of the policy is related to the contracted or the temporary workers. It states the rights and permissions for these workers. Some of the items hat can be included in this portion are as follows:
No contractors can use FTP unless specifically granted to use it.
No contractors shall have access to TELNET unless specifically granted to use it.
No contractors shall have access to unauthorized resources.
No contractors shall have access to scan the network.
Answer A is incorrect. Only authorized resources should be accessed by the contractors.
You work as a Network Administrator for Blue Well Inc. The company has a TCP/IP-based routed network. Two segments have been
configured on the network as shown below:
One day, the switch in Subnet B fails. What will happen?
Each correct answer represents a complete solution. Choose all that apply.
According to the question, the network is a routed network where two segments have been divided and each segment has a switch. These
switches are connected to a common router. All workstations in a segment are connected to their respective subnet's switches. Failure of the
switch in Subnet B will make all workstations connected to it offline. Moreover, communication between the two subnets will be affected, as
there will be no link to connect to Subnet B.
Which of the following methods can be helpful to eliminate social engineering threat?
Each correct answer represents a complete solution. Choose three.
The following methods can be helpful to eliminate social engineering threat:
Password policies
Vulnerability assessments
Data classification
Password policy should specify that how the password can be shared.
Company should implement periodic penetration and vulnerability assessments. These assessments usually consist of using known hacker
tools and common hacker techniques to breach a network security. Social engineering should also be used for an accurate assessment.
Since social engineers use the knowledge of others to attain information, it is essential to have a data classification model in place that all
employees know and follow. Data classification assigns level of sensitivity of company information. Each classification level specifies that who
can view and edit data, and how it can be shared.
Fill in the blank with the appropriate term.
When two routers are used in a firewall configuration, the internal router is known as a .
Correct
interior router present in the screened host firewall architecture. It is attached to the perimeter network and protects the internal network
from the Internet and the perimeter net.
A choke router is basically employed for the job of packet filtering for the firewall. It is also used to provide access to selected services that
are outbound from the internal net to the Internet. These services may include outgoing Telnet, FTP, WAIS, Archie, Gopher, etc.
You work as a Desktop Support Technician for uCertify Inc. The company uses a Windows-based network comprising 50 Windows XP
Professional computers. You want to include the Safe Mode with Command Prompt feature into the boot.ini file of a Windows XP Professional
computer. Which of the following switches will you use?
Safe-mode boot switches are used in the Windows operating systems to use the afe-mode boot feature. To use this feature the user should
press F8 during boot. These modes are available in the Boot.ini file. Users can also automate the boot process using this feature. Various
switches used for various modes are given below:
Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits
Get All 416 Questions & Answers