Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Audit GSNA GSNA Dumps PDF

Page: 11 / 14
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 41

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

rdump

C.

setfdprm

D.

mount

Question 42

Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. The Manager of the company requires Mark to use tables instead of frames in the Web site. What is the major advantage that a table-structured Web site has over a frame-structured Web site?

Options:

A.

Easy maintenance

B.

Speed

C.

Better navigation

D.

Capability of being bookmarked or added to the Favorites folder

Question 43

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Question 44

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer? (Choose two)

Options:

A.

SSID of the WLAN

B.

WEP key

C.

IP address of the router

D.

MAC address of the router

Page: 11 / 14
Total 368 questions