[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GSNA Dumps with VCE and PDF 221-230

CollectDumps 2017 Sep GIAC Official New Released GSNA
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSNA.html

GIAC Systems and Network Auditor

Question No: 221 – (Topic 3)

You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. The network has a vast majority of Cisco Systems routers and Cisco network switches. You want to take a snapshot of the router running configuration and archive running configuration of the router to persistent storage. Which of the following steps will you take?

  1. Secure the boot configuration

  2. Restore an archived primary bootset

  3. Verify the security of the bootset

  4. Enable the image resilience

Answer: A

Explanation: In order to take a snapshot of the router running configuration and archive running configuration of the router to persistent storage, you should secure the boot configuration of the router using the secure boot-config command. Answer: D is incorrect. You can enable the image resilience, if you want to secure the Cisco IOS image. Answer: C is incorrect. By verifying the security of bootset, you can examine whether or not the Cisco IOS Resilient Configuration is enabled and the files in the bootset are secured.

Answer: B is incorrect. By restoring an archived primary bootset, you can restore a primary bootset from a secure archive after an NVRAM has been erased or a disk has been formatted.

Question No: 222 – (Topic 3)

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He

executes the following command in the terminal: echo $USER, $UID Which of the following will be displayed as the correct output of the above command?

  1. John, 0

  2. root, 0

  3. root, 500

  4. John, 502

Answer: B

Explanation: According to the scenario, John is a root user. Hence, the value of the environmental variables $USER and $UID will be root and 0, respectively.

Question No: 223 – (Topic 3)

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall.

While configuring ISA Server 2006, which of the following is NOT necessary?

  1. Setting up of monitoring on ISA Server

  2. Defining how ISA Server would cache Web contents

  3. Defining ISA Server network configuration

  4. Configuration of VPN access

Answer: D

Explanation: Configuration of VPN access is not mandatory. It is configured on the basis of requirement. Answer: A, B, C are incorrect. All these steps are mandatory for the configuration of the ISA Server 2006 firewall.

Question No: 224 – (Topic 3)

You work as the Network Administrator for a company. You configure a Windows 2000- based computer as the Routing and Remote Access server, so that users can access the company#39;s network, remotely. You want to log a record of all the users who access the network by using Routing and Remote Access. What will you do to log all the logon activities?

  1. On the Routing and Remote Access server, enable log authentication requests in auditing, and define the path for the log file in Remote Access Logging.

  2. On the Routing and Remote Access server, enable log authentication requests in

    Remote Access Logging.

  3. On the Routing and Remote Access server, enable log authentication requests in auditing.

  4. Do nothing as the Windows 2000-based Routing and Remote Access server automatically creates a log record for each connection attempt.

Answer: B

Explanation: The Routing and Remote Access service can log all the records of authentication and accounting information for connection attempts when Windows authentication or accounting is enabled. This can be done by enabling the log authentication requests in the properties of the Remote Access Logging folder, in the Routing and Remote Access snap-in , where you can configure the type of activity to log, i.e., accounting or authentication activity and log file settings. This information is stored in the form of a log file in #39;%SystemRoot%System32LogFiles#39; folder. For each authentication attempt, the name of the remote access policy , that either accepted or rejected the connection attempt, is recorded. The logged information is useful to track remote access usage, and authentication attempts.

Question No: 225 – (Topic 3)

What is the extension of a Cascading Style Sheet?

  1. .hts

  2. .cs

  3. .js

  4. .css

Answer: D

Explanation: A Cascading Style Sheet (CSS) is a separate text file that keeps track of design and formatting information, such as colors, fonts, font sizes, and margins, used in Web pages. CSS is used to provide Web site authors greater control on the appearance and presentation of their Web pages. It has codes that are interpreteA, Dpplied by the browser on to the Web pages and their elements. CSS files have .css extension. There are three types of Cascading Style Sheets: External Style Sheet Embedded Style Sheet Inline Style Sheet

Question No: 226 – (Topic 3)

Which of the following is a basic feature of the Unix operating system? (Choose three)

  1. It is highly portable across hardware.

  2. All files can be individually protected using read, write, and execute permissions for the user, group, and others.

  3. It allows all the modules to be loaded into memory.

  4. A user can execute multiple programs at the same time from a single terminal.

Answer: A,B,D

Explanation: The basic features of Unix are as follows: Multi-user: It supports more than one user to access the system simultaneously through a set of terminals attached to a system. Multi-tasking: A user can execute multiple programs at the same time from a single terminal. Time sharing: The operating system shares CPU time among tasks. Portability: It is highly portable across hardware. Modularity: It allows only needed modules to be loaded into the memory. File structure: It has an inverted tree like file structure, with files and directories created within the file structure. Security: All files can be individually protected using read, write, and execute permissions for the user, group, and others. Network support: It uses the TCP/IP protocol. Advanced graphics: CAD-CAM applications perform the best in a Unix System with its varied support for graphics card.

Question No: 227 – (Topic 3)

Which of the following statements are true about a hot site?

  1. It is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

  2. It is the most inexpensive backup site.

  3. It can be used within an hour for data recovery.

  4. It is cheaper than a cold site but more expensive than a worm site.

Answer: A,C

Explanation: A hot site is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data. A hot site can be used within an hour for data recovery. The capacity of the hot site may or may not match the capacity of the original site depending on the organization#39;s requirements. This type of backup site is the most expensive to operate. Hot sites are popular with organizations that

operate real time processes such as financial institutions, government agencies, and ecommerce providers. the original site. A cold site is the most inexpensive type of backup site for an organization to operate since it does not include backed up copies of data and information from the original location of the organization, nor does it include hardware already set up. A warm site is, quite logically, a compromise between hot and cold in terms of resources and cost.

Question No: 228 – (Topic 3)

You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

Collectdumps 2017 PDF and VCE

You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task. Which of the following actions will you perform to accomplish the task?

  1. Create a scheduled task to download definition files for Windows Defender every Sunday.

  2. Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

  3. Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

  4. Click the arrow beside the Help button Click the Check for updates option.

Answer: C

Explanation: According to the question, Windows Defender should scan the laptop for all the known spyware and other potentially unwanted software, including the latest one.

Windows Defender uses definitions to scan the system. Definitions are files that include the information of known spyware and potentially unwanted software. To scan a computer for the latest spyware, Windows Defender requires the latest definition files available on the Internet. For this, you have to configure Windows Defender to check for the latest definitions and download them, if available, before scanning the computer. Furthermore, the question also states that the task must be performed automatically. In order to accomplish the task, you will have to select the Check for updated definitions before scanning check box in the Automatic Scanning section.

Question No: 229 – (Topic 3)

Which of the following tags will create two vertical frames, as given in the image below, where the left frame is half as wide as the right one?

Collectdumps 2017 PDF and VCE

  1. lt;FRAMESET ROWS = quot;*, *quot;gt;

    lt;FRAME SRC = quot;cell1.htmquot;gt;

    lt;FRAME SRC = quot;cell2.htmquot;gt;

    lt;/FRAMESETgt;

  2. lt;FRAMESET ROWS = quot;1, 2quot;gt;

    lt;FRAME SRC = quot;cell1.htmquot;gt;

    lt;FRAME SRC = quot;cell2.htmquot;gt;

    lt;/FRAMESETgt;

  3. lt;FRAMESET COLS = quot;*, *quot;gt;

    lt;FRAME SRC = quot;cell1.htmquot;gt;

    lt;FRAME SRC = quot;cell2.htmquot;gt;

    lt;/FRAMESETgt;

  4. lt;FRAMESET ROWS = quot;*, 2*quot;gt;

    lt;FRAME SRC = quot;cell1.htmquot;gt;

    lt;FRAME SRC = quot;cell2.htmquot;gt;

    lt;/FRAMESETgt;

  5. lt;FRAMESET COLS = quot;*, 2*quot;gt;

lt;FRAME SRC = quot;cell1.htmquot;gt;

lt;FRAME SRC = quot;cell2.htmquot;gt;

lt;/FRAMESETgt;

Answer: E Explanation:

lt;FRAMESETgt; tag specifies a frameset used to organize multiple frames and nested framesets in an HTML document. It defines the location, size, and orientation of frames. An HTML document can either contain a

lt;FRAMESETgt; tag or a lt;BODYgt; tag. The COLS attribute of the

lt;FRAMESETgt; tag defines the width of the vertical frames. The ROWS attribute defines the height of the horizontal frames. The code in answer option E will create two identical frames. The left frame will be half as wide as the right frame because of the relative size attributes given in the lt;FRAMESETgt; tag, i.e.,

lt;FRAMESET COLS = quot;*, 2*quot;gt;.

Question No: 230 – (Topic 3)

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?

  1. Vulnerabilities that allow a remote cracker to control sensitive data on a system

  2. Misconfiguration (e.g. open mail relay, missing patches, etc.)

  3. Vulnerabilities that allow a remote cracker to access sensitive data on a system

  4. Vulnerabilities that help in Code injection attacks

Answer: A,B,C

Explanation: Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a remote cracker to control or access sensitive data on a system. Misconfiguration (e.g. open mail relay, missing patches, etc). Default passwords, a few common passwords, and

blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack. Denials of service against the TCP/IP stack by using mangled packets. On UNIX (including Mac OS X), it consists of nessusd, the Nessus daemon, which does the scanning, and nessus, the client, which controls scans and presents the vulnerability results to the user. For Windows, Nessus 3 installs as an executable and has a self-contained scanning, reporting, and management system.

Operations: In typical operation, Nessus begins by doing a port scan with one of its four internal portscanners (or it can optionally use Amap or Nmap ) to determine which ports are open on the target and then tries various exploits on the open ports. The vulnerability tests, available as subscriptions, are written in NASL (Nessus Attack Scripting Language), a scripting language optimized for custom network interaction. Tenable Network Security produces several dozen new vulnerability checks (called plugins) each week, usually on a daily basis. These checks are available for free to the general public; commercial customers are not allowed to use this Home Feed any more. The Professional Feed (which is not free) also gives access to support and additional scripts (audit and compliance tests). Optionally, the results of the scan can be reported in various formats, such as plain text, XML, HTML, and LaTeX. The results can also be saved in a knowledge base for debugging. On UNIX, scanning can be automated through the use of a command-line client. There exist many different commercial, free and open source tools for both UNIX and Windows to manage individual or distributed Nessus scanners. If the user chooses to do so (by disabling the option #39;safe checks#39;), some of Nessus#39;s vulnerability tests may try to cause vulnerable services or operating systems to crash. This lets a user test the resistance of a device before putting it in production. Nessus provides additional functionality beyond testing for known network vulnerabilities. For instance, it can use Windows credentials to examine patch levels on computers running the Windows operating system, and can perform password auditing using dictionary and brute force methods.

Nessus 3 and later can also audit systems to make sure they have been configured per a specific policy, such as the NSA#39;s guide for hardening Windows servers. Answer: D is incorrect. Nessus cannot be used to scan vulnerabilities that help in Code injection attacks.

100% Free Download!
Download Free Demo:GSNA Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSNA Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE