GIAC GSNA Exam Practice Questions (P. 4)
- Full Access (416 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Which of the following statements about a session are true? (Choose two)
- AThe creation time can be obtained using the getSessionCreationTime() method of the HttpSession.
- BThe getAttribute() method of the HttpSession interface returns a String.
- CThe time for the setMaxInactiveInterval() method of the HttpSession interface is specified in seconds.
- DThe isNew() method is used to identify if the session is new.
Correct Answer:
Answer: A is incorrect. The creation time of a session can be obtained using the getCreationTime() method of the HttpSession.
The setMaxInactiveInterval() method sets the maximum time in seconds before a session becomes invalid. The syntax of this method is as follows: public void setMaxInactiveInterval(int interval) Here, interval is specified in seconds. The isNew() method of the HttpSession interface returns true if the client does not yet know about the session, or if the client chooses not to join the session. This method throws an IllegalStateException if called on an invalidated session.
Answer B is incorrect. The getAttribute(String name) method of the HttpSession interface returns the value of the named attribute as an object. It returns a null value if no attribute with the given name is bound to the session. This method throws an IllegalStateException if it is called on an invalidated session.
Answer: A is incorrect. The creation time of a session can be obtained using the getCreationTime() method of the HttpSession.
The setMaxInactiveInterval() method sets the maximum time in seconds before a session becomes invalid. The syntax of this method is as follows: public void setMaxInactiveInterval(int interval) Here, interval is specified in seconds. The isNew() method of the HttpSession interface returns true if the client does not yet know about the session, or if the client chooses not to join the session. This method throws an IllegalStateException if called on an invalidated session.
Answer B is incorrect. The getAttribute(String name) method of the HttpSession interface returns the value of the named attribute as an object. It returns a null value if no attribute with the given name is bound to the session. This method throws an IllegalStateException if it is called on an invalidated session.
send
light_mode
delete
Question #32
Which of the following statements is true about a relational database?
- AIt is difficult to extend a relational database.
- BThe standard user and application program interface to a relational database is Programming Language (PL).
- CIt is a collection of data items organized as a set of formally-described tables.
- DIt is a set of tables containing data fitted into runtime defined categories.
Correct Answer:
Answer: B is incorrect. The standard user and application program interface to a relational database is the structured query language (SQL).
A relational database is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. contains one or more data categories in columns. Each row contains a unique instance of data for the categories defined by the columns.
Answer: B is incorrect. The standard user and application program interface to a relational database is the structured query language (SQL).
A relational database is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. contains one or more data categories in columns. Each row contains a unique instance of data for the categories defined by the columns.
send
light_mode
delete
Question #33
You work as a Network Administrator for BetaTech Inc. You have been assigned the task of designing the firewall policy for the company.
Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?
Which of the following statements is unacceptable in the 'acceptable use statement' portion of the firewall policy?
- AThe computers and their applications should be used for organizational related activities only.
- BComputers may not be left unattended with a user account still logged on.
- CApplications other than those supplied or approved by the company can be installed on any computer.
- DThe installed e-mail application can only be used as the authorized e-mail service.
Correct Answer:
Applications other than those supplied or approved by the company shall not be installed on any computer. Answer: A, B, D are incorrect. All of these statements
stand true in the 'acceptable use statement' portion of the firewall policy.
Applications other than those supplied or approved by the company shall not be installed on any computer. Answer: A, B, D are incorrect. All of these statements
stand true in the 'acceptable use statement' portion of the firewall policy.
send
light_mode
delete
Question #34
You have recently joined as a Network Auditor in XYZ CORP. The company has a Windows-based network. You have been assigned the task to determine whether or not the company's goal is being achieved.
As an auditor, which of the following tasks should you perform before conducting the data center review? Each correct answer represents a complete solution.
Choose three.
As an auditor, which of the following tasks should you perform before conducting the data center review? Each correct answer represents a complete solution.
Choose three.
- AReview the future IT organization chart.
- BMeet with IT management to determine possible areas of concern.
- CReview the company's IT policies and procedures.
- DResearch all operating systems, software applications, and data center equipment operating within the data center.
Correct Answer:
Answer: A is incorrect. An auditor should review the current organization chart. Reviewing the future organization chart would not help in finding the current threats
The auditor should be adequately educated about the company and its critical business activities before conducting a data center review. The objective of the data center is to align data center activities with the goals of the business while maintaining the security and integrity of critical information and processes. To adequately determine if whether or not the client's goal is being achieved, the auditor should perform the following before conducting the review: Meet with IT management to determine possible areas of concern. Review the current IT organization chart. Review job descriptions of data center employees. Research all operating systems, software applications, and data center equipment operating within the data center. Review the company's IT policies and procedures. Evaluate the company's IT budget and systems planning documentation. Review the data center's disaster recovery plan. to the organization.
Answer: A is incorrect. An auditor should review the current organization chart. Reviewing the future organization chart would not help in finding the current threats
The auditor should be adequately educated about the company and its critical business activities before conducting a data center review. The objective of the data center is to align data center activities with the goals of the business while maintaining the security and integrity of critical information and processes. To adequately determine if whether or not the client's goal is being achieved, the auditor should perform the following before conducting the review: Meet with IT management to determine possible areas of concern. Review the current IT organization chart. Review job descriptions of data center employees. Research all operating systems, software applications, and data center equipment operating within the data center. Review the company's IT policies and procedures. Evaluate the company's IT budget and systems planning documentation. Review the data center's disaster recovery plan. to the organization.
send
light_mode
delete
Question #35
Patricia joins XYZ CORP., as a Web Developer. While reviewing the company's Web site, she finds that many words including keywords are misspelled.
How will this affect the Web site traffic?
How will this affect the Web site traffic?
- ALeave a bad impression on users.
- BSearch engine relevancy may be altered.
- CLink exchange with other sites becomes difficult.
- DThe domain name cannot be registered.
Correct Answer:
B
Web site traffic depends upon the number of users who are able to locate a Web site. Search engines are one of the most frequently used tools to locate Web sites. They perform searches on the basis of keywords contained in the Web pages of a Web site. Keywords are simple text strings that are associated with one or more topics of a Web page. Misspelled keywords prevent Web pages from being displayed in the search results.
B
Web site traffic depends upon the number of users who are able to locate a Web site. Search engines are one of the most frequently used tools to locate Web sites. They perform searches on the basis of keywords contained in the Web pages of a Web site. Keywords are simple text strings that are associated with one or more topics of a Web page. Misspelled keywords prevent Web pages from being displayed in the search results.
send
light_mode
delete
Question #36
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly.
What type of security audit do you need to conduct to resolve the problem?
What type of security audit do you need to conduct to resolve the problem?
- ANon-operational audit
- BDependent audit
- CIndependent audit
- DOperational audit
Correct Answer:
Answer: B is incorrect. It is not a valid type of security audit.
An independent audit is an audit that is usually conducted by external or outside resources. It is the process of reviewing detailed audit logs for the following purposes:
✑ To examine the system activities and access logs
✑ To assess the adequacy of system methods
✑ To assess the adequacy of system controls
✑ To examine compliance with established enterprise network system policies
✑ To examine compliance with established enterprise network system procedures
✑ To examine effectiveness of enabling, support, and core processes
Answer: B is incorrect. It is not a valid type of security audit.
An independent audit is an audit that is usually conducted by external or outside resources. It is the process of reviewing detailed audit logs for the following purposes:
✑ To examine the system activities and access logs
✑ To assess the adequacy of system methods
✑ To assess the adequacy of system controls
✑ To examine compliance with established enterprise network system policies
✑ To examine compliance with established enterprise network system procedures
✑ To examine effectiveness of enabling, support, and core processes
send
light_mode
delete
Question #37
You have an online video library. You want to upload a directory of movies. Since this process will take several hours, you want to ensure that the process continues even after the terminal is shut down or session is closed.
What will you do to accomplish the task?
What will you do to accomplish the task?
- AUse the bg command to run the process at the background.
- BAdd the nohup command in front of the process.
- CAdd the nohup command at the end of the process.
- DRun the process inside a GNU Screen-style screen multiplexer.
Correct Answer:
Answer: C is incorrect. The nohup command works when it is added in front of a command.
Whenever the nohup command is added in front of any command or process, it makes the command or process run even after the terminal is shut down or session is closed. All processes, except the 'at' and batch requests, are killed when a user logs out. If a user wants a background process to continue running even after he logs out, he must use the nohup command to submit that background command. To nohup running processes, press ctrl+z, enter "bg" and enter
"disown". The other way to accomplish the task is to run the command/process inside a GNU Screen-style screen multiplexer, and then detach the screen. GNU
Screen maintains the illusion that the user is always logged in, and allows the user to reattach at any time. This has the advantage of being able to continue to interact with the program once reattached (which is impossible with nohup alone).
Answer: C is incorrect. The nohup command works when it is added in front of a command.
Whenever the nohup command is added in front of any command or process, it makes the command or process run even after the terminal is shut down or session is closed. All processes, except the 'at' and batch requests, are killed when a user logs out. If a user wants a background process to continue running even after he logs out, he must use the nohup command to submit that background command. To nohup running processes, press ctrl+z, enter "bg" and enter
"disown". The other way to accomplish the task is to run the command/process inside a GNU Screen-style screen multiplexer, and then detach the screen. GNU
Screen maintains the illusion that the user is always logged in, and allows the user to reattach at any time. This has the advantage of being able to continue to interact with the program once reattached (which is impossible with nohup alone).
send
light_mode
delete
Question #38
You work as a Web Deployer for UcTech Inc. You write the <security constraint> element for an application in which you write the <auth-constraint> sub-element as follows: <auth-constraint> <role-name>*</role-name> </auth-constraint> Who will have access to the application?
- AOnly the administrator
- BNo user
- CAll users
- DIt depends on the application.
Correct Answer:
C
The <auth-constraint> element is a sub-element of the <security-constraint> element. It defines the roles that are allowed to access the Web resources specified by the <web-resource-collection> sub-elements.
The <auth-constraint> element is written in the deployment descriptor as follows:
<security-constraint> <web-resource-collection> ---------------- </web-resource-collection> <auth-constraint> <role-name>Administrator</role-name> </auth- constraint> </security-constraint>
Writing Administrator within the <role-name> element will allow only the administrator to have access to the resource defined within the <web-resource-collection> element.
C
The <auth-constraint> element is a sub-element of the <security-constraint> element. It defines the roles that are allowed to access the Web resources specified by the <web-resource-collection> sub-elements.
The <auth-constraint> element is written in the deployment descriptor as follows:
<security-constraint> <web-resource-collection> ---------------- </web-resource-collection> <auth-constraint> <role-name>Administrator</role-name> </auth- constraint> </security-constraint>
Writing Administrator within the <role-name> element will allow only the administrator to have access to the resource defined within the <web-resource-collection> element.
send
light_mode
delete
Question #39
You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router.
You run the following command for a router interface:
show interface serial0
You get the following output:
Serial0 is administratively down, line protocol is down
What will be your conclusion after viewing this output?
You run the following command for a router interface:
show interface serial0
You get the following output:
Serial0 is administratively down, line protocol is down
What will be your conclusion after viewing this output?
- AThere is a physical problem either with the interface or the cable attached to it.
- BThe router has no power.
- CThere is a problem related to encapsulation.
- DThe interface is shut down.
Correct Answer:
Answer: A is incorrect. Had there been a physical problem with the interface, the output would not have displayed "administratively down". Instead, the output
According to the question, the output displays that the interface is administratively down. Administratively down means that the interface is shut down. In order to up the interface, you will have to open the interface with the no shutdown command. would be as follows: serial0 is down, line protocol is down
Answer: A is incorrect. Had there been a physical problem with the interface, the output would not have displayed "administratively down". Instead, the output
According to the question, the output displays that the interface is administratively down. Administratively down means that the interface is shut down. In order to up the interface, you will have to open the interface with the no shutdown command. would be as follows: serial0 is down, line protocol is down
send
light_mode
delete
Question #40
Sam works as a Web Developer for McRobert Inc. He creates a Web site. He wants to include the following table in the Web site:
He writes the following HTML code to create the table:
1. <TABLE BORDER="1" WIDTH="500">
2. <TR>
3.
4.
5. </TR>
6. <TR>
7. <TD>
8. </TD>
9. <TD>
10. </TD>
11. <TD>
12. </TD>
13. </TR>
14. <TR>
15. <TD>
16. </TD>
17. <TD>
18. </TD>
19. <TD>
20. </TD>
21. </TR>
22. </TABLE>
Which of the following tags will Sam place at lines 3 and 4 to create the table?
He writes the following HTML code to create the table:
1. <TABLE BORDER="1" WIDTH="500">
2. <TR>
3.
4.
5. </TR>
6. <TR>
7. <TD>
8. </TD>
9. <TD>
10. </TD>
11. <TD>
12. </TD>
13. </TR>
14. <TR>
15. <TD>
16. </TD>
17. <TD>
18. </TD>
19. <TD>
20. </TD>
21. </TR>
22. </TABLE>
Which of the following tags will Sam place at lines 3 and 4 to create the table?
- Aat line 3 at line 4
- Bat line 3 at line 4
- Cat line4 at line
- Dat line 3 at line 4
Correct Answer:
Answer: C is incorrect.
The tag is used to specify each cell of the table. It can be used only within a row in a table. The ROWSPAN attribute of the tag specifies the number of rows that a cell spans over in a table. Since, the first cell of the table spans over three rows, Sam will use specifies the number of columns that the head row contains.
Answer: C is incorrect.
The tag is used to specify each cell of the table. It can be used only within a row in a table. The ROWSPAN attribute of the tag specifies the number of rows that a cell spans over in a table. Since, the first cell of the table spans over three rows, Sam will use specifies the number of columns that the head row contains.
send
light_mode
delete
All Pages