giac gsna practice test

Exam Title: GIAC Systems and Network Auditor Exam

Last update: Nov 27 ,2025
Question 1

George works as an office assistant in Soft Well Inc. The company uses the Windows Vista operating
system. He wants to disable a program running on a computer. Which of the following Windows
Defender tools will he use to accomplish the task?

  • A. Allowed items
  • B. Quarantined items
  • C. Options
  • D. Software Explorer
Answer:

D


Explanation:
Software Explorer is used to remove, enable, or disable a program running on a computer.
Answer: A is incorrect. Allowed items contains a list of all the programs that a user has chosen not to
monitor with Windows Defender.
Answer: C is incorrect. Options is used to choose how Windows Defender should monitor all the
programs running on a computer.
Answer: B is incorrect. Quarantined items is used to remove or restore a program blocked by
Windows Defender.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

You work as a Network Administrator for McNeil Inc. The company has a Windows Active Directory-
based single domain single forest network. The functional level of the forest is Windows Server 2003.
The company's management has decided to provide laptops to its sales team members. These
laptops are equipped with smart card readers. The laptops will be configured as wireless network
clients. You are required to accomplish the following tasks:
The wireless network communication should be secured.
The laptop users should be able to use smart cards for getting authenticated.
In order to accomplish the tasks, you take the following steps:
Configure 802.1x and WEP for the wireless connections.
Configure the PEAP-MS-CHAP v2 protocol for authentication.
What will happen after you have taken these steps?

  • A. Both tasks will be accomplished.
  • B. The laptop users will be able to use smart cards for getting authenticated.
  • C. The wireless network communication will be secured.
  • D. None of the tasks will be accomplished.
Answer:

C


Explanation:
As 802.1x and WEP are configured, this step will enable the secure wireless network communication.
For authentication, you have configured
the PEAP-MS-CHAP v2 protocol. This protocol can be used for authentication on wireless networks,
but it cannot use a public key infrastructure
(PKI). No certificate can be issued without a PKI. Smart cards cannot be used for authentication
without certificates. Hence, the laptop users
will not be able to use smart cards for getting authenticated.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You
want to print the super block and block the group information for the filesystem present on a system.
Which of the following Unix commands can you use to accomplish the task?

  • A. e2fsck
  • B. dump
  • C. dumpe2fs
  • D. e2label
Answer:

C


Explanation:
In Unix, the dumpe2fs command dumps the filesystem superblock and blocks the group information.
Answer: B is incorrect. In Unix, the dump command is used to back up an ext2 filesystem.
Answer: A is incorrect. The e2fsck command is used to check the second extended file system (E2FS)
of a Linux computer.
Syntax:
e2fsck [options] <device>
Where, <device> is the file name of a mounted storage device (for example, /dev/hda1). Several
options are used with the e2fsck command.
Following is a list of some important options:

Answer: D is incorrect. In Unix, the e2label command is used to change the label of an ext2
filesystem.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Which of the following is a wireless auditing tool that is used to pinpoint the actual physical location
of wireless devices in the network?

  • A. KisMAC
  • B. Ekahau
  • C. Kismet
  • D. AirSnort
Answer:

B


Explanation:
Ekahau is an easy-to-use powerful and comprehensive tool for network site surveys and
optimization. It is an auditing tool that can be used
to pinpoint the actual physical location of wireless devices in the network. This tool can be used to
make a map of the office and then perform
the survey of the office. In the process, if one finds an unknown node, ekahau can be used to locate
that node.
Answer: D is incorrect. AirSnort is a Linux-based WLAN WEP cracking tool that recovers encryption
keys. AirSnort operates by passively
monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million
packets to decrypt the WEP keys.
Answer: C is incorrect. Kismet is a Linux-based 802.11 wireless network sniffer and intrusion
detection system. It can work with any
wireless card that supports raw monitoring (rfmon) mode. Kismet can sniff 802.11b, 802.11a,
802.11g, and 802.11n traffic. Kismet can be
used for the following tasks:
To identify networks by passively collecting packets
To detect standard named networks
To detect masked networks
To collect the presence of non-beaconing networks via data traffic
Answer: A is incorrect. KisMAC is a wireless network discovery tool for Mac OS X. It has a wide range
of features, similar to those of
Kismet, its Linux/BSD namesake and far exceeding those of NetStumbler, its closest equivalent on
Windows. The program is geared toward
network security professionals, and is not as novice-friendly as similar applications. KisMAC will scan
for networks passively on supported
cards - including Apple's AirPort, and AirPort Extreme, and many third-party cards, and actively on
any card supported by Mac OS X itself.
Cracking of WEP and WPA keys, both by brute force, and exploiting flaws such as weak scheduling
and badly generated keys is supported
when a card capable of monitor mode is used, and packet reinjection can be done with a supported
card. GPS mapping can be performed
when an NMEA compatible GPS receiver is attached. Data can also be saved in pcap format and
loaded into programs such as Wireshark.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

  • A. Magic Lantern
  • B. KeyGhost Keylogger
  • C. Alchemy Remote Executor
  • D. SocketShield
Answer:

A


Explanation:
Magic Lantern works both as an encryption-cracking tool and as a keylogger.
Answer: C is incorrect. Alchemy Remote Executor is a system management tool that allows Network
Administrators to execute programs
on remote network computers without leaving their workplace. From the hacker's point of view, it
can be useful for installing keyloggers,
spyware, Trojans, Windows rootkits and such. One necessary condition for using the Alchemy
Remote Executor is that the user/attacker must
have the administrative passwords of the remote computers on which the malware is to be installed.
Answer: B is incorrect. The KeyGhost keylogger is a hardware keylogger that is used to log all
keystrokes on a computer. It is a tiny
device that clips onto the keyboard cable. Once the KeyGhost keylogger is attached to the computer,
it quietly logs every key pressed on the
keyboard into its own internal Flash memory (just as with smart cards). When the log becomes full, it
overwrites the oldest keystrokes with
the newest ones.
Answer: D is incorrect. SocketShield provides a protection shield to a computer system against
malware, viruses, spyware, and various
types of keyloggers. SocketShield provides protection at the following two levels:
1.Blocking: In this level, SocketShield uses a list of IP addresses that are known as purveyor of
exploits. All http requests for any page in
these domains are simply blocked.
2.Shielding: In this level, SocketShield blocks all the current and past IP addresses that are the cause
of unauthorized access.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You
want to set some terminal characteristics and environment variables. Which of the following Unix
configuration files can you use to accomplish the task?

  • A. /etc/sysconfig/routed
  • B. /proc/net
  • C. /etc/sysconfig/network-scripts/ifcfg-interface
  • D. /etc/sysconfig/init
Answer:

D


Explanation:
In Unix, the /etc/sysconfig/init file is used to set terminal characteristics and environment variables.
Answer: B is incorrect. In Unix, the /proc/net file contains status information about the network
protocols.
Answer: C is incorrect. In Unix, the /etc/sysconfig/network-scripts/ifcfg-interface file is the
configuration file used to define a network
interface.
Answer: A is incorrect. In Unix, the /etc/sysconfig/routed file is used to set up the dynamic routing
policies.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network.
While auditing the company's network, you are facing problems in searching the faults and other
entities that belong to it. Which of the following risks may occur due to the existence of these
problems?

  • A. Residual risk
  • B. Inherent risk
  • C. Secondary risk
  • D. Detection risk
Answer:

D


Explanation:
Detection risks are the risks that an auditor will not be able to find what they are looking to detect.
Hence, it becomes tedious to report
negative results when material conditions (faults) actually exist. Detection risk includes two types of
risk:
Sampling risk: This risk occurs when an auditor falsely accepts or erroneously rejects an audit
sample.
Nonsampling risk: This risk occurs when an auditor fails to detect a condition because of not applying
the appropriate procedure or
using procedures inconsistent with the audit objectives (detection faults).
Answer: A is incorrect. Residual risk is the risk or danger of an action or an event, a method or a
(technical) process that, although being
abreast with science, still conceives these dangers, even if all theoretically possible safety measures
would be applied (scientifically
conceivable measures).
The formula to calculate residual risk is (inherent risk) x (control risk) where inherent risk is (threats
vulnerability). In the economic context,
residual means "the quantity left over at the end of a process; a remainder".
Answer: B is incorrect. Inherent risk, in auditing, is the risk that the account or section being audited
is materially misstated without
considering internal controls due to error or fraud. The assessment of inherent risk depends on the
professional judgment of the auditor, and
it is done after assessing the business environment of the entity being audited.
Answer: C is incorrect. A secondary risk is a risk that arises as a straight consequence of
implementing a risk response. The secondary
risk is an outcome of dealing with the original risk. Secondary risks are not as rigorous or important
as primary risks, but can turn out to be so
if not estimated and planned properly.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which of the following statements are true about locating rogue access points using WLAN discovery
software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-
Fi compliant MiniPCI card? Each correct answer represents a complete solution. Choose two.

  • A. These tools can determine the rogue access point even when it is attached to a wired network.
  • B. These tools can determine the authorization status of an access point.
  • C. These tools cannot detect rogue access points if the victim is using data encryption.
  • D. These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.
Answer:

D and B


Explanation:
WLAN discovery software such as NetStumbler, Kismet, or MacStumbler can be used to detect rogue
access points if the victim is using IEEE
802 frequency bands. However, if the victim is using non-IEEE 802.11 frequency bands or unpopular
modulations, these tools might not detect
rogue access. NetStumbler, kismet, or MacStumbler also gives the authorization status of an access
point. A Rogue access point (AP) is set up
by the attackers in an Enterprise's network. The attacker captures packets in the existing wireless
LAN (WLAN) and finds the SSID and
security keys (by cracking). Then the attacker sets up his own AP using the same SSID and security
keys. The network clients unknowingly use
this AP and the attacker captures their usernames and passwords. This can help the attacker to
intrude the security and have access to the
Enterprise data.
Answer: C and A are incorrect. The WLAN software such as NetStumbler, Kismet, or MacStumbler can
search rogue access points even
when the victim is using data encryption. However, these tools cannot determine the rogue access
point even when it is attached to a wired
network.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

A Web developer with your company wants to have wireless access for contractors that come in to
work on various projects. The process of getting this approved takes time. So rather than wait, he has
put his own wireless router attached to one of the network ports in his department. What security
risk does this present?

  • A. None, adding a wireless access point is a common task and not a security risk.
  • B. It is likely to increase network traffic and slow down network performance.
  • C. This circumvents network intrusion detection.
  • D. An unauthorized WAP is one way for hackers to get into a network.
Answer:

D


Explanation:
Any unauthorized Wireless Access Point (WAP) is a serious security breach. Its configuration might be
very unsecure. For example it might not use encryption or MAC filtering, thus allowing anyone in
range to get on the network.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Which of the following allows the use of multiple virtual servers using different DNS names resolved
by the same IP address?

  • A. HTTP 1.1
  • B. JAVA
  • C. HTML
  • D. VPN
Answer:

A


Explanation:
HTTP 1.1 allows the use of multiple virtual servers, all using different DNS names resolved by the
same IP address. The WWW service supports
a concept called virtual server. A virtual server can be used to host multiple domain names on the
same physical Web server. Using virtual
servers, multiple FTP sites and Web sites can be hosted on a single computer. It means that there is
no need to allocate different computers
and software packages for each site.
Answer: D is incorrect. VPN stands for virtual private network. It allows users to use the Internet as a
secure pipeline to their corporate
local area networks (LANs). Remote users can dial-in to any local Internet Service Provider (ISP) and
initiate a VPN session to connect to their
corporate LAN over the Internet. Companies using VPNs significantly reduce long-distance dial-up
charges. VPNs also provide remote
employees with an inexpensive way of remaining connected to their company's LAN for extended
periods.
Answer: B is incorrect. Java is an object oriented programming language developed by Sun
Microsystems. It allows the creation of
platform independent executables. Java source code files are compiled into a format known as
bytecode (files with .class extension). Java
supports programming for the Internet in the form of Java applets. Java applets can be executed on a
computer having a Java interpreter and
a run-time environment known as Java Virtual Machine (JVM). Java Virtual Machines (JVMs) are
available for most operating systems, including
UNIX, Macintosh OS, and Windows.
Answer: C is incorrect. HTML stands for Hypertext Markup Language. It is a set of markup symbols or
codes used to create Web pages
and define formatting specifications. The markup tells the Web browser how to display the content
of the Web page.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 41
Viewing questions 1-10 out of 415
Go To
page 2