New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GSNA Questions Bank

Page: 10 / 14
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 37

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently backed up his entire Linux hard drive into the my_backup.tgz file. The size of the my_backup.tgz file is 800MB. Now, he wants to break this file into two files in which the size of the first file named my_backup.tgz.aa should be 600MB and that of the second file named my_backup.tgz.ab should be 200MB. Which of the following commands will John use to accomplish his task?

Options:

A.

split --verbose -b 200m my_backup.tgz my_backup.tgz

B.

split --verbose -b 200m my_backup.tgz my_backup.tgz

C.

split --verbose -b 600m my_backup.tgz my_backup.tgz

D.

split --verbose -b 600m my_backup.tgz my_backup.tgz

Question 38

You have purchased a laptop that runs Windows Vista Home Premium. You want to protect your computer from malicious applications, such as spyware, while connecting to the Internet. You configure Windows Defender on your laptop to schedule scan daily at 2 AM as shown in the image below:

You want Windows Defender to scan the laptop for all the known spyware and other potentially unwanted software, including the latest one. You do not want to manually perform this task. Which of the following actions will you perform to accomplish the task?

Options:

A.

Create a scheduled task to download definition files for Windows Defender every Sunday.

B.

Configure Windows Defender to use the definition file placed on the Microsoft Update site for scanning the laptop.

C.

Select the Check for updated definitions before scanning check box in the Automatic Scanning section.

D.

Click the arrow beside the Help button Click the Check for updates option.

Question 39

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Web ripping

B.

Steganography

C.

Email spoofing

D.

Social engineering

Question 40

Which of the following types of servers are dedicated to provide resources to hosts on the network? (Choose three)

Options:

A.

Web servers

B.

Monitoring servers

C.

Mail servers

D.

Default gateway servers

E.

Print servers

Page: 10 / 14
Total 368 questions