Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Exactprep GSNA Questions

Page: 9 / 14
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 33

Mark is an attacker. He wants to discover wireless LANs by listening to beacons or sending probe requests and thereby provide a launch point for further attacks. Which of the following tools can he use to accomplish the task?

Options:

A.

DStumbler

B.

Wellenreiter

C.

KisMAC

D.

Airmon-ng

Question 34

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mke2fs

B.

mkswap

C.

mkfs

D.

hdparm

Question 35

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to set the user login features on the systems with the shadow passwords. Which of the following Unix configuration files can you use to accomplish the task?

Options:

A.

/etc/logrotate.conf

B.

/etc/login.defs

C.

/etc/magic

D.

/etc/filesystems

Question 36

You work as a Desktop Support Technician for XYZ CORP. The company uses a Windows-based network comprising 50 Windows XP Professional computers. You want to include the Safe Mode with Command Prompt feature into the boot.ini file of a Windows XP Professional computer. Which of the following switches will you use?

Options:

A.

/safeboot:network /sos /bootlog /noguiboot

B.

/safeboot:minimal /sos /bootlog /noguiboot

C.

/safeboot:minimal(alternateshell) /sos /bootlog /noguiboot

D.

/safeboot:dsrepair /sos

Page: 9 / 14
Total 368 questions