Free GIAC GSNA Exam Actual Questions

The questions for GSNA were last updated On Feb 18, 2025

At ValidExamDumps, we consistently monitor updates to the GIAC GSNA exam questions by GIAC. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the GIAC Systems and Network Auditor exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by GIAC in their GIAC GSNA exam. These outdated questions lead to customers failing their GIAC Systems and Network Auditor exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the GIAC GSNA exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Show Answer Hide Answer
Correct Answer: A, D

In order to enable email communication, you will have to open ports 25 and 110. Port 25 is used by SMTP to send emails. Port 110 is used by POP3 to receive emails.


Question No. 2

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack

tools?

Show Answer Hide Answer
Correct Answer: D

Wireless intrusion prevention system (WIPS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use

of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator

whenever a rogue access point is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.

Rogue devices can spoof MAC address of an authorized network device as their own. WIPS uses fingerprinting approach to weed out devices

with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against

the known signatures of pre-authorized, known wireless devices.

Answer B is incorrect. An Intrusion detection system (IDS) is used to detect unauthorized attempts to access and manipulate computer

systems locally or through the Internet or an intranet. It can detect several types of attacks and malicious behaviors that can compromise the

security of a network and computers. This includes network attacks against vulnerable services, unauthorized logins and access to sensitive

data, and malware (e.g. viruses, worms, etc.). An IDS also detects attacks that originate from within a system. In most cases, an IDS has

three main components: Sensors, Console, and Engine. Sensors generate security events. A console is used to alert and control sensors and

to monitor events. An engine is used to record events and to generate security alerts based on received security events. In many IDS

implementations, these three components are combined into a single device. Basically, following two types of IDS are used :

Network-based IDS

Host-based IDS

Answer A is incorrect. Snort is an open source network intrusion prevention and detection system that operates as a network sniffer. It

logs activities of the network that is matched with the predefined signatures. Signatures can be designed for a wide range of traffic, including

Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP).

The three main modes in which Snort can be configured are as follows:

Sniffer mode: It reads the packets of the network and displays them in a continuous stream on the console.

Packet logger mode: It logs the packets to the disk.

Network intrusion detection mode: It is the most complex and configurable configuration, allowing Snort to analyze network traffic for

matches against a user-defined rule set.

Answer C is incorrect. A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against

unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic

between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.


Question No. 3

With the appropriate command.

You want to search the most recent command that starts with the string 'user'. For this, you will enter the command to get the desired result.

Show Answer Hide Answer
Correct Answer: A

the history !user command to search the most recent command that starts with the string 'user'. In the bash shell, the history command is

used to view the recently executed commands. History is on by default. A user can turn off history using the command set +o history and turn

it on using set -o history. An environment variable HISTSIZE is used to inform bash about how many history lines should be kept. The

following commands are frequently used to view and manipulate history:


Question No. 4

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to do RARP mapping from hardware mapping addresses to IP addresses. Which of the following Unix configuration files can you use to accomplish the task?

Show Answer Hide Answer
Correct Answer: D

In Unix, the /etc/ethers file is used by system administrators for RARP mapping from hardware mapping addresses to IP addresses.

Answer A is incorrect. In Unix, the /etc/dhcpd.conf file is the configuration file for the DHCP server daemon.

Answer C is incorrect. In Unix, the /etc/exports file describes exported file systems for NFS services.

Answer B is incorrect. In Unix, the /etc/motd file automatically displays the message of the day after a successful login.


Question No. 5

Which of the following does an anti-virus program update regularly from its manufacturer's Web site?

Show Answer Hide Answer
Correct Answer: D

An anti-virus program updates the virus definition file regularly from the anti-virus manufacturer's Web site.

Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such

programs may also prevent and remove adware, spyware, and other forms of malware. Traditional antivirus software solutions run virus

scanners on schedule, on demand and some run scans in real time. If a virus or malware is located, the suspect file is usually placed into a

quarantine to terminate its chances of disrupting the system. Traditional antivirus solutions scan and compare against a publicized and

regularly updated dictionary of malware otherwise known as a blacklist. Some antivirus solutions have additional options that employ a

heuristic engine which further examines the file to see if it is behaving in a similar manner to previous examples of malware. A new technology

utilized by a few antivirus solutions is whitelisting; this technology first checks if the file is trusted and only questions those that are not. With

the addition of wisdom of crowds, antivirus solutions backup other antivirus techniques by harnessing the intelligence and advice of a

community of trusted users to protect each other.

Answer C is incorrect. A service pack is a collection of Fixes and Patches in a single product. A service pack can be used to handle a

large number of viruses and bugs or to update an operating system with advanced and better capabilities. A service pack usually contains a

number of file replacements.

Answer A is incorrect. Hotfix is a collection of files used by Microsoft for software updates that are released between major service pack

releases. A hotfix is about a problem, occurring under specific circumstances, which cannot wait to be fixed till the next service pack release.

Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as soon as possible.

Answer B is incorrect. An anti-virus program does not update Permissions regularly from its manufacturer's Web site.