[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSNA Dumps with VCE and PDF 121-130

CollectDumps 2017 Sep GIAC Official New Released GSNA
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSNA.html

GIAC Systems and Network Auditor

Question No: 121 – (Topic 2)

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

  1. Change hub with switch.

  2. Deploying a powerful antenna.

  3. Disabling SSID broadcast.

  4. Implement WEP.

Answer: C

Explanation: Disabling SSID broadcast will free up bandwidth in a WLAN environment. It is used to enhance security of a Wireless LAN (WLAN). It makes difficult for attackers to find the access point (AP). It is also used by enterprises to prevent curious people from trying to access the WLAN.

Question No: 122 – (Topic 2)

You work as the Network Technician for XYZ CORP. The company has a Linux-based network. You are working on the Red Hat operating system. You want to view only the last 4 lines of a file named /var/log/cron. Which of the following commands should you use to accomplish the task?

  1. tail -n 4 /var/log/cron

  2. tail /var/log/cron

  3. cat /var/log/cron

  4. head /var/log/cron

Answer: A

Explanation: The tail -n 4 /var/log/cron command will show the last four lines of the file

/var/log/cron.

Question No: 123 – (Topic 2)

Which of the following are the countermeasures against WEP cracking?

  1. Using the longest key supported by hardware.

  2. Changing keys often.

  3. Using a non-obvious key.

  4. Using a 16 bit SSID.

Answer: A,B,C

Explanation: A user can use some countermeasures to prevent WEP cracking. Although WEP is least secure, it should not be used. However, a user can use the following methods to mitigate WEP cracking: Use a non-obvious key. Use the longest key supported by hardware. Change keys often. Use WEP in combination with other security features, such as rapid WEP key rotation and dynamic keying using 802.1x. Consider WEP a deterrent, not a guarantee. Answer: D is incorrect. SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to communicate with each other. The SSID on computers and the devices in WLAN can be set manually and automatically. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict. A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve network security.

Question No: 124 – (Topic 2)

Which of the following statements are true about SSIDs?

  1. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

  2. SSIDs are case insensitive text strings and have a maximum length of 64 characters.

  3. All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

  4. SSID is used to identify a wireless network.

Answer: A,C,D

Explanation: SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to communicate with each other. The SSID on computers and the devices in WLAN can be set manually and automatically. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict. A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve network security.

Question No: 125 – (Topic 2)

Which of the following statements is NOT true about FAT16 file system?

  1. FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

  2. FAT16 file system supports file-level compression.

  3. FAT16 does not support file-level security.

  4. FAT16 file system supports Linux operating system.

Answer: A,B

Explanation: FAT16 file system was developed for disks larger than 16MB. It uses 16-bit allocation table entries. FAT16 file system supports all Microsoft operating systems. It also supports OS/2 and Linux. Answer: C, D are incorrect. All these statements are true about FAT16 file system.

Question No: 126 – (Topic 2)

John works as a Network Administrator for Perfect Solutions Inc. The company has a

Linux-based network. John is working as a root user on the Linux operating system. He has a data.txt file in which each column is separated by the TAB character. Now, he wants to use this file as input for a data mining software he has created. The problem preventing him from accomplishing his task is that with his data mining software, he has used TAB as a delimiter to distinguish between columns. Hence, he is unable to use this file as input for the software. However, if he somehow replaces the TAB characters of the file with SPACE characters, he can use this file as an input file for his data mining software. Which of the following commands will John use to replace the TAB characters of the file with SPACE characters?

  1. expand -t 1 data.txt gt; data.txt

  2. cat data.txt

  3. chmod 755 data.txt

  4. touch data.txt

Answer: A Explanation:

According to the scenario, John can replace the TAB characters with single space characters with the expand command. With the expand -t 1 data.txt gt; data.txt command, the TABs of data.txt are changed into single spaces and are redirected by using the gt; command into the data.txt file. Now, John can use the data.txt file as the input file for his data mining software.

Question No: 127 – (Topic 2)

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

  1. Examining your antivirus logs

  2. Examining your domain controller server logs

  3. Examining your firewall logs

  4. Examining your DNS Server logs

Answer: C

Explanation: Firewall logs will show all incoming and outgoing traffic. By examining those logs, you can do port scans and use other penetration testing tools that have been used on

your firewall.

Question No: 128 – (Topic 2)

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of a domain controller, two Windows 2003 member servers, and one hundred client computers. The company employees use laptops with Windows XP Professional. These laptops are equipped with wireless network cards that are used to connect to access points located in the Marketing department of the company. The company employees log on to the domain by using a user name and password combination. The wireless network has been configured with WEP in addition to 802.1x. Mark wants to provide the best level of security for the kind of authentication used by the company. What will Mark do to accomplish the task?

  1. Use IPSec

  2. Use MD5

  3. Use PEAP

  4. Use EAP-TLS

Answer: C

Explanation: In order to provide the best level of security for the kind of authentication used by the company, Mark will have to use the PEAP protocol. This protocol will provide the strongest password-based authentication for a WEP solution with 802.1x. Implementing 802.1x authentication for wireless security requires using an Extensible Authentication Protocol (EAP)-based method for authentication. There are two EAP-based methods: 1.EAP-Transport Layer Security (EAP-TLS) 2.Protected EAP (PEAP) Answer: A is incorrect. IPSec has nothing to do with this issue.

Question No: 129 – (Topic 2)

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets: 10.10.2.103 10.10.0.0/24 Which of the following sets of commands will you use to accomplish the task?

  1. access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255

    access-list 10 deny any line vty 0 4 access-class 10 out

  2. access-list 10 permit 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255

    access-list 10 deny any line vty 0 4 access-group 10 in

  3. access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-class 10 in

  4. access-list 10 permit host 10.10.2.103

access-list 11 permit host 10.10.0.0 255.255.255.0

access-list 12 deny any line vty 0 4

access-group 10, 11, 12 in

Answer: C

Explanation: In order to accomplish the task, you will have to run the following sets of commands: access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0

0.0.0.255 access-list 10 deny any line vty 0 4 access-class 10 in This configuration set meets all the requirements. The ACL is correctly configured and is applied to the VTY lines using the access-class command for inbound connections. Answer: D is incorrect. This configuration actually creates 3 separate ACL#39;s (10, 11, and 12) and also incorrectly attempts to apply the ACL#39;s to the VTY lines. Answer: A is incorrect. This configuration is correct except for the access-class command being applied in the outbound direction. When using quot;access-class outquot;, the router will not match connections coming into the router for Telnet and/or SSH. Instead, it will match connections being generated from the router. Answer: B is incorrect. This configuration is correct except for the access-group command. Access-group is used to apply ACLs to an interface. Access-class is used to apply ACLs to VTY lines.

Question No: 130 – (Topic 2)

Which of the following is a prevention-driven activity to reduce errors in the project and to help the project meet its requirements?

  1. Audit sampling

  2. Asset management

  3. Access control

  4. Quality assurance

Answer: D

Explanation: Quality assurance is the application of planned, systematic quality activities to ensure that the project will employ all processes needed to meet requirements. It is a prevention-driven activity to reduce errors in the project and to help the project meet its requirements. Answer: A is incorrect. Audit sampling is an application of the audit procedure that enables the IT auditor to evaluate audit evidence within a class of transactions for the purpose of forming a conclusion concerning the population. When designing the size and structure of an audit sample, the IT auditor should consider the audit objectives determined when planning the audit, the nature of the population, and the sampling and selection methods. Answer: C is incorrect. The process of limiting access to the resources of a Web site is called access control. Access control can be performed in the following ways: Registering the user in order to access the resources of the Web site.

This can be confirmed by the user name and password. Limiting the time during which resources of the Web site can be used. For example, the Web site can be viewed between certain hours of a day. Answer: B is incorrect. It is the practice of managing the whole life cycle (design, construction, commissioning, operating, maintaining, repairing, modifying, replacing and decommissioning/disposal) of physical and infrastructure assets such as structures, production, distribution networks, transport systems, buildings, and other physical assets.

100% Free Download!
Download Free Demo:GSNA Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSNA Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE