Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

GIAC GSNA GIAC Systems and Network Auditor Exam Practice Test

Page: 1 / 37
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 1

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to see the list of the filesystems mounted automatically at startup by the mount -a command in the /etc/rc startup file. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/named.conf

B.

/etc/groups

C.

/etc/mtab

D.

/etc/fstab

Question 2

You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure. Which of the following tools can you use to accomplish the task?

Options:

A.

Wget

B.

WinSSLMiM

C.

Whisker

D.

httprint

Question 3

Which of the following is a wireless auditing tool that is used to pinpoint the actual physical location of wireless devices in the network?

Options:

A.

KisMAC

B.

Ekahau

C.

Kismet

D.

AirSnort

Question 4

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

e2fsck

B.

dump

C.

dumpe2fs

D.

e2label

Question 5

What does CSS stand for?

Options:

A.

Cascading Style Sheet

B.

Coded System Sheet

C.

Cyclic Style Sheet

D.

Cascading Style System

Question 6

Which of the following statements is true about a relational database?

Options:

A.

It is difficult to extend a relational database.

B.

The standard user and application program interface to a relational database is Programming Language (PL).

C.

It is a collection of data items organized as a set of formally-described tables.

D.

It is a set of tables containing data fitted into runtime defined categories.

Question 7

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

Options:

A.

HTTP

B.

TELNET

C.

NetBIOS

D.

HTTPS

Question 8

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

Options:

A.

Magic Lantern

B.

KeyGhost Keylogger

C.

Alchemy Remote Executor

D.

SocketShield

Question 9

Which of the following mechanisms is closely related to authorization?

Options:

A.

Sending secret data such as credit card information.

B.

Allowing access to a particular resource.

C.

Verifying username and password.

D.

Sending data so that no one can alter it on the way.

Question 10

Which of the following statements about a perimeter network are true? (Choose three)

Options:

A.

It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall.

B.

It has a connection to a private network through an external firewall and a connection to an internal network through an interior firewall.

C.

It is also known as a demilitarized zone or DMZ.

D.

It prevents access to the internal corporate network for outside users.

Question 11

You work as a Network Administrator for TechPerfect Inc. The company has a secure wireless network. Since the company's wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool. Which of the following statements are true about NetStumbler?

Options:

A.

It can be integrated with the GPS.

B.

It cannot identify the channel being used.

C.

It can identify the SSIDs.

D.

It works with a wide variety of cards.

Question 12

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.

IPChains

B.

Tripwire

C.

Hunt

D.

Ethercap

Question 13

Which of the following statements are true about data aggregation?

Options:

A.

A common aggregation purpose is to get more information about particular groups based on specific variables.

B.

Data aggregation cannot be user-based.

C.

Data aggregation is any process in which information is gathered and expressed in a summary form.

D.

Online analytic processing (OLAP) is a simple type of data aggregation.

Question 14

Which of the following controls define the direction and behavior required for technology to function properly?

Options:

A.

Detailed IS controls

B.

General controls

C.

Application controls

D.

Pervasive IS controls

Question 15

Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?

Options:

A.

tac

B.

tr

C.

cat

D.

less

Question 16

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Web ripping

B.

Steganography

C.

Email spoofing

D.

Social engineering

Question 17

Which of the following are known as safety critical software?

Options:

A.

Software that is used to apply a critical decision-making process

B.

Software that manages safety critical data including display of safety critical information

C.

Software that intervenes when a safe condition is present or is about to happen

D.

Software that is used to create safety critical functions

Question 18

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes: a.War driving b.Detecting unauthorized access pointsc.Detecting causes of interference on a WLAN d.WEP ICV error trackinge.Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.

Options:

A.

THC-Scan

B.

NetStumbler

C.

Absinthe

D.

Kismet

Question 19

Which of the following is a type of web site monitoring that is done using web browser emulation or scripted real web browsers?

Options:

A.

Route analytics

B.

Passive monitoring

C.

Network tomography

D.

Synthetic monitoring

Question 20

Mark works as the Network Administrator for XYZ CORP. The company has a Unix-based network. Mark wants to scan one of the Unix systems to detect security vulnerabilities. To accomplish this, he uses TARA as a system scanner. What can be the reasons that made Mark use TARA?

Options:

A.

It has a very specific function of seeking paths to root.

B.

It is composed mostly of bash scripts

C.

It works on a wide variety of platforms.

D.

It is very modular.

Question 21

Which of the following types of attack is described in the statement below? "It is a technique employed to compromise the security of network switches. In this attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table."

Options:

A.

Man-in-the-middle

B.

Blind spoofing

C.

Dictionary

D.

MAC flooding

Question 22

Which of the following protocols is the mandatory part of the WPA2 standard in the wireless networking?

Options:

A.

CCMP

B.

ARP

C.

WEP

D.

TKIP

Question 23

You work as the Network Administrator for XYZ CORP. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see first five lines of the file /etc/passwd. Which of the following commands should you use to accomplish the task?

Options:

A.

head -n 5 /etc/passwd

B.

head 5 -n /etc/passwd

C.

tail -n 5 /etc/passwd

D.

head /etc/passwd

Question 24

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:

A.

Protocol

B.

ActiveX control

C.

Cookie

D.

Keyword

Question 25

Which of the following processes is described in the statement below? "This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Perform Quantitative Risk Analysis

B.

Monitor and Control Risks

C.

Perform Qualitative Risk Analysis

D.

Identify Risks

Question 26

John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linux-based network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?

Options:

A.

echo $VAR1

B.

touch VAR1

C.

export VAR1

D.

env -u VAR1

Question 27

Data access auditing is a surveillance mechanism that watches over access to all sensitive information contained within the database. What are the questions addressed in a perfect data access auditing solution?

Options:

A.

Who accessed the data?

B.

When was the data accessed?

C.

For whom was the data accessed?

D.

What was the SQL query that accessed the data?

Question 28

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Scripting attack

D.

Cross-Site Request Forgery

Question 29

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires fast processing of the data in the database of the company so that answers to queries can be generated quickly. To provide fast processing, you have a conceptual idea of representing the dimensions of data available to a user in the data cube format. Which of the following systems can you use to implement your idea?

Options:

A.

SYSDBA

B.

MDDBMS

C.

Federated database system

D.

Hierarchical database system

Question 30

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows: C.\whisker.pl -h target_IP_address -- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address = Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22 + 200 OK: HEAD /cgi-bin/printenv John recognizes /cgi-bin/printenv vulnerability ( 'Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Options:

A.

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

B.

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

D.

This vulnerability helps in a cross site scripting attack.

Question 31

You work as an Exchange Administrator for XYZ CORP. The network design of the company is given below:

Question # 31

Employees are required to use Microsoft Outlook Web Access to access their emails remotely. You are required to accomplish the following goals: Ensure fault tolerance amongst the servers. Ensure the highest level of security and encryption for the Outlook Web Access clients. What will you do to accomplish these goals?

Options:

A.

Install one front-end Exchange 2000 server and continue to run Microsoft Outlook Web Access on the existing server. Place the new server on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

B.

Install two front-end Exchange 2000 servers. Place the new servers on the internal network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

C.

Install two front-end Exchange 2000 servers. Place the new servers on the perimeter network and configure load balancing between them. Configure Certificate Services. Create a rule on the firewall to redirect port 443 to the servers.

D.

Install two Exchange 2000 servers. Place the new servers on the perimeter network. Configure unique URLs for each server. Configure Certificate Services. Create a rule on the firewall to direct port 443 to the servers.

Question 32

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

Options:

A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

Question 33

You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string in the log file: (Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool is being used for the unauthorized access. Which of the following tools have you ascertained?

Options:

A.

AiroPeek

B.

AirSnort

C.

Kismet

D.

NetStumbler

Question 34

You work as the Network Administrator of a Windows 2000 Active Directory network. Your company's offices are at Dallas and New York. Your company wants to configure a secure, direct Internet link. The company's management wants to accomplish the following tasks: Keep the offices' internal resources secure from outsiders. Keep communication secure between the two offices. You install a firewall in each office. Which of the tasks does this action accomplish?

Options:

A.

The action taken will fulfill the secure communication concern.

B.

The action taken will accomplish neither of the goals.

C.

The action taken will fulfill the internal resource security concern.

D.

The action taken will accomplish both the goals.

Question 35

You work as a Network Administrator for Tech-E-book Inc. You are configuring the ISA Server 2006 firewall to provide your company with a secure wireless intranet. You want to accept inbound mail delivery though an SMTP server. What basic rules of ISA Server do you need to configure to accomplish the task.

Options:

A.

Publishing rules

B.

Network rules

C.

Mailbox rules

D.

Access rules

Question 36

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up a honey pot

B.

Vulnerability scanning

C.

Setting up IDS

D.

Port scanning

Question 37

Which of the following is used to execute a SQL statement from the SQL buffer?

Options:

A.

Entering an asterisk (*)

B.

Pressing [RETURN] once

C.

Pressing [RETURN] twice

D.

Entering a slash (/)

E.

Pressing [ESC] twice.

Question 38

You are the Security Consultant and you frequently do vulnerability assessments on client computers. You want to have a standardized approach that would be applicable to all of your clients when doing a vulnerability assessment. What is the best way to do this?

Options:

A.

Utilize OVAL.

B.

Create your own standard and use it with all clients.

C.

Utilize each client's security policies when doing a vulnerability assessment for that client.

D.

Utilize the Microsoft security recommendations.

Question 39

You are the Security Administrator for an Internet Service Provider. From time to time your company gets subpoenas from attorneys and law enforcement for records of customers' access to the internet. What policies must you have in place to be prepared for such requests?

Options:

A.

Group access policies

B.

Backup policies

C.

User access policies

D.

Storage and retention policies

Question 40

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

UDP

B.

RPC

C.

IDLE

D.

TCP SYN/ACK

Question 41

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server: Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Options:

A.

PsPasswd

B.

WinSSLMiM

C.

PsFile

D.

UserInfo

Question 42

Which of the following techniques can be used to determine the network ranges of any network?

Options:

A.

Whois query

B.

SQL injection

C.

Snooping

D.

Web ripping

Question 43

You work as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. You have used the LogMiner feature for auditing purposes. Which of the following files store a copy of the data dictionary? (Choose two)

Options:

A.

Online redo log files

B.

Operating system flat file

C.

Dump file

D.

Control file

Question 44

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

Options:

A.

Warkitting

B.

War driving

C.

Wardialing

D.

Demon dialing

Question 45

Which of the following statements are true about KisMAC?

Options:

A.

It scans for networks passively on supported cards.

B.

It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.

C.

It is a wireless network discovery tool for Mac OS X.

D.

Data generated by KisMAC can also be saved in pcap format. \

Question 46

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to see the username, real name, home directory, encrypted password, and other information about a user. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/passwd

B.

/etc/printcap

C.

/etc/hosts

D.

/etc/inittab

Question 47

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Reverse social engineering attack

B.

Impersonation attack

C.

Important user posing attack

D.

In person attack

Question 48

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

Options:

A.

Change hub with switch.

B.

Deploying a powerful antenna.

C.

Disabling SSID broadcast.

D.

Implement WEP.

Question 49

Which of the following does an anti-virus program update regularly from its manufacturer's Web site?

Options:

A.

Hotfixes

B.

Permissions

C.

Service packs

D.

Definition

Question 50

You want to record auditing information in the SYS.AUD$ table, and also want to record SQL bind variables as well as the SQL text in the audit trail. Which of the following statements will accomplish this task?

Options:

A.

ALTER SYSTEM SET AUDIT_TRAIL = DB, XML SCOPE=SPFILE;

B.

ALTER SYSTEM SET AUDIT_TRAIL = 'DB, EXTENDED' SCOPE=SPFILE;

C.

ALTER SYSTEM SET AUDIT_TRAIL = 'DB','EXTENDED' SCOPE=SPFILE;

D.

ALTER SYSTEM SET AUDIT_TRAIL = DB, EXTENDED SCOPE=SPFILE;

E.

ALTER SYSTEM SET AUDIT_FILE_DEST = 'DB, EXTENDED' SCOPE=SPFILE;

F.

ALTER SYSTEM SET AUDIT_TRAIL = DB, EXTENDED SCOPE=BOTH;

Question 51

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

Options:

A.

Sam Spade

B.

John the Ripper

C.

Cheops-ng

D.

AiroPeek

Question 52

Which of the following policies helps reduce the potential damage from the actions of one person?

Options:

A.

CSA

B.

Separation of duties

C.

Internal audit

D.

Risk assessment

Question 53

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

Options:

A.

The network layer headers and the session layer port numbers

B.

The transport layer port numbers and the application layer headers

C.

The application layer port numbers and the transport layer headers

D.

The presentation layer headers and the session layer port numbers

Question 54

You work as a Network Administrator for NTY Inc. The company has a secure wireless network. While auditing the network for maintaining security, you find an unknown node. You want to locate that node. Which tool will you use to pinpoint the actual physical location of the node?

Options:

A.

Kismet

B.

Ekahau

C.

WEPCrack

D.

AirSnort

Question 55

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Page: 1 / 37
Total 368 questions