Want to pass your GIAC Systems and Network Auditor GNSA exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You have been assigned the task to design the authentication system for the remote users of the company. For security purposes, you want to issue security tokens to the remote users. The token should work on the one-time password principle and so once used, the next password gets generated.
Which of the following security tokens should you issue to accomplish the task?
A. Virtual tokens
B. Event-based tokens
C. Bluetooth tokens
D. Single sign-on software tokens
You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company.
Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?
A. No contractors shall have access to the authorized resources.
B. No contractors shall be permitted to scan the network.
C. No contractors shall have access to the unauthorized resources.
D. No contractors can access FTP unless specifically granted permissions to use it.
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the secure terminals from where the root can be allowed to log in.
Which of the following Unix configuration files can you use to accomplish the task?
A. /etc/services
B. /etc/ioports
C. /proc/interrupts
D. /etc/securetty