[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSNA Dumps with VCE and PDF 181-190

CollectDumps 2017 Sep GIAC Official New Released GSNA
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSNA.html

GIAC Systems and Network Auditor

Question No: 181 – (Topic 2)

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires a database that can receive data from various types of operating systems. You want to design a multidimensional database to accomplish the task. Which of the following statements are true about a multidimensional database?

  1. It is used to optimize Online Analytical Processing (OLAP) applications.

  2. It is used to optimize data warehouse.

  3. It is rarely created using input from existing relational databases.

  4. It allows users to ask questions that are related to summarizing business operations and trends.

Answer: A,B,D

Explanation: A multidimensional database (MDB) is a type of database that is optimized for data warehouse and Online Analytical Processing (OLAP) applications.

Multidimensional databases are frequently created using input from existing relational databases. Whereas a relational database is typically accessed using a Structured Query Language (SQL) query, a multidimensional database allows a user to ask questions like quot;How many Aptivas have been sold in Nebraska so far this year?quot; and similar questions related to summarizing business operations and trends. An OLAP application that accesses data from a multidimensional database is known as a MOLAP (multidimensional OLAP) application. Answer: C is incorrect. A multidimensional database is frequently created using input from existing relational databases.

Question No: 182 – (Topic 2)

You want to record auditing information in the SYS.AUD$ table, and also want to record SQL bind variables as well as the SQL text in the audit trail. Which of the following statements will accomplish this task?

  1. ALTER SYSTEM SET AUDIT_TRAIL = DB, XML SCOPE=SPFILE;

  2. ALTER SYSTEM SET AUDIT_TRAIL = #39;DB, EXTENDED#39; SCOPE=SPFILE;

  3. ALTER SYSTEM SET AUDIT_TRAIL = #39;DB#39;,#39;EXTENDED#39; SCOPE=SPFILE;

  4. ALTER SYSTEM SET AUDIT_TRAIL = DB, EXTENDED SCOPE=SPFILE;

  5. ALTER SYSTEM SET AUDIT_FILE_DEST = #39;DB, EXTENDED#39; SCOPE=SPFILE;

  6. ALTER SYSTEM SET AUDIT_TRAIL = DB, EXTENDED SCOPE=BOTH;

Answer: C,D

Explanation: The initialization parameter AUDIT_TRAIL is used to specify the kind of auditing that needs to be performed, as well as the destination where it will be performed. There are three basic values for auditing that are DB, OS, and XML. Specifying DB sends all audit rows to the table SYS.AUD$, OS sends the audit rows to an operating system file, and XML sends the audit rows to an operating system file in the XML format. The location for external audit rows is specified by the AUDIT_FILE_DEST parameter. By adding the EXTENDED parameter for either DB or XML auditing, all SQL bind variables and the text of all SQL commands are included in the audit row. EXTENDED cannot be specified for OS auditing. In addition, NONE can be specified as the value for AUDIT_TRAIL, which will disable all auditing. Answer: B is incorrect. DB, EXTENDED in single quotes cannot be specified when setting the AUDIT_TRAIL parameter. Answer: E is incorrect. AUDIT_TRAIL must be set to specify the type of auditing. AUDIT_FILE_DEST is used to specify the operating system location for either OS or XML auditing. Answer: A is incorrect. DB and XML auditing cannot be specified at the same time and the database must be restarted for the auditing change to go into effect.

Question No: 183 – (Topic 2)

You work as the Network Administrator for XYZ CORP. The company has a Unix-based

network. You want to track the system for user logins. To accomplish the task, you need to analyze the log configuration files. Which of the following Unix log configuration files can you use to accomplish the task?

  1. /var/log/messages

  2. /var/log/secure

  3. /var/spool/mail

  4. /var/log/maillog

Answer: B

Explanation: In Unix, the /var/log/secure file is used to track the systems for user logins. Answer: D is incorrect. In Unix, the /var/log/maillog file is the normal system maillog file. Answer: A is incorrect. In Unix, the /var/log/messages file is the main system message log file. Answer: C is incorrect. In Unix, the /var/spool/mail file is the file where mailboxes are usually stored.

Question No: 184 – (Topic 2)

You work as a Software Developer for UcTech Inc. You are building a Web site that will contain study materials on the Java language. The company wants that members can access all the pages, but non-members have only limited access to the Web site pages. Which of the following security mechanisms will you use to accomplish the task?

  1. Data integrity

  2. Authentication

  3. Confidentiality

  4. Authorization

Answer: D

Explanation: Authorization is a process that verifies whether a user has permission to access a Web resource. A Web server can restrict access to some of its resources to only those clients that log in using a recognized username and password. To be authorized, a user must first be authenticated. Answer: B is incorrect. Authentication is the process of verifying the identity of a user. This is usually done using a user name and password. This process compares the provided user name and password with those stored in the database of an authentication server. Answer: C is incorrect. Confidentiality is a mechanism that ensures that only the intended and authorized recipients are able to read data. The data is so encrypted that even if an unauthorized user gets access to it, he will not get any

meaning out of it. Answer: A is incorrect. Data integrity is a mechanism that ensures that the data is not modified during transmission from source to destination. This means that the data received at the destination should be exactly the same as that sent from the source.

Question No: 185 – (Topic 2)

Which of the following commands can you use to search a string #39;pwd#39; in all text files without opening them? (Choose two)

  1. vi

  2. grep

  3. sed

  4. locate

Answer: B,C

Explanation: sed and grep are the two commands that can be used to search a specified string in all text files without opening them. sed is a stream editor that is used to perform basic text transformations on an input stream (a file or input from a pipeline).

Question No: 186 – (Topic 2)

Pingdom is a website monitoring service. Which of the following services are provided by Pingdom?

  1. It creates complicated charts to spot trends and imprecisely pinpoint problems.

  2. It works as an iPhone application to make sure that a website is reachable and responding properly at all times.

  3. It is used to monitor sites and servers on the Internet.

  4. It is used to track the uptime, downtime, and performance of websites.

Answer: B,C,D Explanation:

Pingdom is a website monitoring service that is used by administrators to monitor sites and servers on the Internet. It alerts the site owners if it detects a problem. Pingdom service is

used to track the uptime, downtime, and overall performance of websites. Pingdom also works as an iPhone application to make sure that a website is reachable and responding properly at all times. If not so, it provides the administrator with the email and SMS alerts. It creates charts and tables that are easy to understand. These charts and tables enable an administrator to spot trends and accurately pinpoint problems. Answer: A is incorrect.

Pingdom creates charts that are easy to understand. These charts are used to spot trends and accurately pinpoint problems.

Question No: 187 – (Topic 2)

Which of the following records is the first entry in a DNS database file?

  1. CNAME

  2. SOA

  3. SRV

  4. MX

Answer: B

Explanation: Start of Authority (SOA) record is the first record in any DNS database file. The SOA resource record includes the following fields: owner, TTL, class, type, authoritative server, refresh, minimum TTL, etc. Answer: A is incorrect. Canonical Name (CNAME) is a resource record that creates an alias for the specified Fully Qualified Domain Name (FQDN). It hides the implementation details of a network from the clients that are connected to the network. Answer: D is incorrect. MX is a mail exchange resource record in the database file of a DNS server. It specifies a mail exchange server for a DNS domain name. Answer: C is incorrect. SRV resource record is a DNS record that enables users to specify the location of servers for a specific service, protocol, and DNS domain. For example, if there are two servers in a domain, creating SRV records specifies which hosts serve as Web servers, and resolvers can then retrieve all the SRV resource records for the Web servers.

Question No: 188 – (Topic 2)

Which of the following is an example of penetration testing?

  1. Configuring firewall to block unauthorized traffic

  2. Implementing HIDS on a computer

  3. Simulating an actual attack on a network

  4. Implementing NIDS on a network

Answer: C

Explanation: Penetration testing is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution. The intent of a penetration testing is to determine feasibility of an attack and the amount of business impact of a successful exploit, if discovered. It is a component of a full security of penetration testing.

Question No: 189 – (Topic 2)

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer? (Choose two)

  1. SSID of the WLAN

  2. WEP key

  3. IP address of the router

  4. MAC address of the router

Answer: A,B

Explanation: In order to connect a client computer to a secured Wireless LAN (WLAN), you are required to provide the following information: SSID of the WLAN WEP key rticlesItemsReportsHelp

Question No: 190 – (Topic 2)

Which of the following statements about the /etc/profile file are true?

  1. It allows a system administrator to create a default home directory for all new users on a computer.

  2. A user can change the settings of the /etc/profile file, but he cannot delete the file. It can only be deleted by the root user.

  3. It can change the default umask value.

  4. It is used to configure and control system-wide default variables.

Answer: C,D

Explanation: The /etc/profile file is used to configure and control system-wide default variables. It performs many operations, some of which are as follows: Exporting variables Setting the umask value Sending mail messages to indicate that new mail has arrived Exporting variables Setting the umask value Sending mail messages to indicate that new mail has arrived Only the root user can configure and change the /etc/profile file for all users on the system. Answer: A is incorrect. The /etc/skel file allows a system administrator to create a default home directory for all new users on a computer or network and thus to make certain that all users begin with the same settings. When a new account is created with a home directory, the entire contents of /etc/skel are copied into the new home directory location. The home directory and its entire contents are then set to the new account#39;s UID and GID, making the new user owner of the initial files. The system administrator can create files in /etc/skel that will provide a nice default environment for users. For example, he might create a /etc/skel/.profile that sets the PATH environment variable for new users. Answer: B is incorrect. Only the root user can change the settings of the /etc/profile file.

100% Free Download!
Download Free Demo:GSNA Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSNA Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE