Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC GSNA Online Access

Page: 7 / 14
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 25

John works as a professional Ethical Hacker. He is assigned a project to test the security of He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.

IPChains

B.

Tripwire

C.

Hunt

D.

Ethercap

Question 26

Which of the following are HTML tags, used to create a table?

Options:

A.

B.

C.

D.

E.

F.

, , and
tags. The tag designs the table layout, the tag is used to create a row, and the
tag is used to create a column. For example, the following code generates a table with two rows and two columns:

Cell 1 Cell 2
Cell 3 Cell 4

Answer: C, E, and D are incorrect. There are no HTML tags such as

, , and .

Question 27

You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

e2fsck

B.

dump

C.

dumpe2fs

D.

e2label

Question 28

You are responsible for a large network that has its own DNS servers. You periodically check the log to see if there are any problems. Which of the following are likely errors you might encounter in the log? (Choose three)

Options:

A.

The DNS server could not create FTP socket for address [IP address of server]

B.

The DNS server could not create an SMTP socket

C.

Active Directory Errors

D.

The DNS server could not create a Transmission Control Protocol (TCP) socket

E.

The DNS server could not initialize the Remote Procedure Call (RPC) service

Page: 7 / 14
Total 368 questions