Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Helping Hand Questions for GSNA

Page: 8 / 14
Total 368 questions

GIAC Systems and Network Auditor Questions and Answers

Question 29

You are tasked with configuring your routers with a minimum security standard that includes the following: A local Username and Password configured on the router A strong privilege mode password Encryption of user passwords Configuring telnet and ssh to authenticate against the router user database Choose the configuration that best meets these requirements.

Options:

A.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4 RouterA(config-line)#login

B.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable password n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

C.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

D.

RouterA(config)#service enable-password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login user

Question 30

In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. Which of the following categories of audit standards established by GAAS are related to professional and technical competence, independence, and professional due care?

Options:

A.

Reporting standards

B.

Risk Analysis standards

C.

General standards

D.

Field work standards

Question 31

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Options:

A.

It uses password hash for client authentication.

B.

It uses a public key certificate for server authentication.

C.

It is supported by all manufacturers of wireless LAN hardware and software.

D.

It provides a moderate level of security.

Question 32

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Cain

B.

PsPasswd

C.

Kismet

D.

AirSnort

Page: 8 / 14
Total 368 questions