显示标签为“GIAC”的博文。显示所有博文
显示标签为“GIAC”的博文。显示所有博文

2014年6月7日星期六

GISP dernières questions d'examen certification GIAC et réponses publiés

Si vous voulez se prouver une compétition et s'enraciner le statut dans l'industrie IT à travers de test Certification GIAC GISP, c'est obligatoire que vous devez avior les connaissances professionnelles. Mais il demande pas mal de travaux à passer le test Certification GIAC GISP. Peut-être d'obtenir le Certificat GIAC GISP peut promouvoir le tremplin vers l'Industrie IT, mais vous n'avez pas besoin de travailler autant dur à préparer le test. Vous avez un autre choix à faire toutes les choses plus facile : prendre le produit de Pass4Test comme vos matériaux avec qui vous vous pratiquez avant le test réel. La Q&A de Pass4Test est recherchée particulièrement pour le test IT.

Le test GIAC GISP est populaire dans l'Industrie IT. Il y a beaucoup de professionnels IT veulent ce passport de IT. Votre vie et salaire sera améliorée avec ce Certificat. Vous aurez une meilleure assurance.

La partie plus nouvelle de test Certification GIAC GISP est disponible à télécharger gratuitement dans le site de Pass4Test. Les exercices de Pass4Test sont bien proches de test réel GIAC GISP. En comparaison les Q&As dans les autres sites, vous trouverez que les nôtres sont beaucoup plus complets. Les Q&As de Pass4Test sont tout recherchés par les experts de Pass4Test, y compris le test simulation.

Code d'Examen: GISP
Nom d'Examen: GIAC (GIAC Information Security Professional)
Questions et réponses: 659 Q&As

Pass4Test est un site d'offrir la bonne Q&A GIAC GISP. Le produit offert par Pass4Test peut vous aider à réussir ce test très difficile. Si vous ajoutez le produit au panier, vous allez économiser le temps et l'effort. Le produiti Pass4Test est bien réputé dans l'Idustrie IT.

Bien qu'il ne soit pas facile à réussir le test GIAC GISP, c'est très improtant à choisir un bon outil de se former. Pass4Test a bien préparé les documentatinos et les exercices pour vous aider à réussir 100% le test. Pass4Test peut non seulement d'être une assurance du succès de votre test GIAC GISP, mais encore à vous aider d'économiser votre temps.

GISP Démo gratuit à télécharger: http://www.pass4test.fr/GISP.html

NO.1 Which of the following terms refers to the protection of data against unauthorized access?
A. Auditing
B. Recovery
C. Confidentiality
D. Integrity
Answer: C

GIAC examen   GISP examen   GISP   GISP examen

NO.2 Which of the following statements about Switched Multimegabit Data Service (SMDS) are true?
Each correct answer represents a complete solution. Choose two.
A. It is a logical connection between two devices.
B. It uses fixed-length (53-byte) packets to transmit information.
C. It supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.
D. It is a high-speed WAN networking technology used for communication over public data networks
Answer: C,D

certification GIAC   GISP   GISP examen   GISP

NO.3 Which of the following attacks involves multiple compromised systems to attack a single target?
A. Brute force attack
B. DDoS attack
C. Dictionary attack
D. Replay attack
Answer: B

GIAC examen   GISP   certification GISP

NO.4 Which of the following is a remote access protocol that supports encryption?
A. PPP
B. SNMP
C. UDP
D. SLIP
Answer: A

certification GIAC   GISP examen   GISP

NO.5 Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. DNS poisoning
B. Keystroke logging
C. Mail bombing
D. ARP poisoning
Answer: D

certification GIAC   certification GISP   GISP examen

NO.6 Which of the following statements about smurf is true?
A. It is an ICMP attack that involves spoofing and flooding.
B. It is a UDP attack that involves spoofing and flooding.
C. It is a denial of service (DoS) attack that leaves TCP ports open.
D. It is an attack with IP fragments that cannot be reassembled.
Answer: A

GIAC   GISP examen   certification GISP   certification GISP   GISP examen

NO.7 Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
A. It filters traffic based on IP addresses.
B. It forwards broadcast packets.
C. It assigns a different network address per port.
D. It filters traffic based on MAC addresses.
Answer: B,D

GIAC examen   GISP examen   certification GISP   GISP   certification GISP   GISP

NO.8 Which of the following refers to encrypted text.?
A. Plaintext
B. Cookies
C. Hypertext
D. Ciphertext
Answer: D

certification GIAC   GISP   certification GISP   certification GISP   GISP

2014年4月8日星期二

Le meilleur matériel de formation examen GIAC GCIA

Dans cette société de l'information technologies, c'est bien populaire que l'on prenne la formation en Internet, Pass4Test est l'un des sites d'offrir la formation particulère pour le test GIAC GCIA. Pass4Test a une expérience riche pour répondre les demandes des candidats.

Participer au test GIAC GCIA est un bon choix, parce que dans l'Industire IT, beaucoup de gens tirent un point de vue que le Certificat GIAC GCIA symbole bien la professionnalité d'un travailleur dans cette industrie.

Code d'Examen: GCIA
Nom d'Examen: GIAC (GIAC Certified Intrusion Analyst)
Questions et réponses: 508 Q&As

Pass4Test est un site d'offrir l'outil de formation convenable pour les candidats de test Certification IT. Le produit de Pass4Test peut aider les candidats à économiser les temps et les efforts. L'outil de formation est bien proche que test réel. Vous allez réussir le test 100% avec l'aide de test simulation de Pass4Test. C'est une bonne affaire à prendre le Certificat IT en coûtant un peu d'argent. N'hésitez plus d'ajouter l'outil de formation au panier.

La solution offerte par Pass4Test comprenant un test simulation bien proche de test réel GIAC GCIA peut vous assurer à réussir 100% le test GIAC GCIA. D'ailleur, le service de la mise à jour gratuite est aussi pour vous. Maintenant, vous pouvez télécharger le démo gratuit pour prendre un essai.

Pass4Test est un site à offrir les Q&As de tout les tests Certification IT. Chez Pass4Test, vous pouvez trouvez de meilleurs matériaux. Nos guides d'étude vous permettent de réussir le test Certification GIAC GCIA sans aucune doute, sinon nous allons rendre votre argent d'acheter la Q&A et la mettre à jour tout de suite, en fait, c'est une situation très rare. Bien que il existe plusieurs façons à améliorer votre concurrence de carrière, Pass4Test est lequel plus efficace : Moins d'argent et moins de temps dépensés, plus sûr à passer le test Certification. De plus, un an de service après vendre est gratuit pour vous.

Être un travailleur IT, est-ce que vous vous souciez encore pour passer le test Certificat IT? Le test examiner les techniques et connaissances professionnelles, donc c'est pas facile à réussir. Pour les candidats qui participent le test à la première fois, une bonne formation est très importante. Pass4Test offre les outils de formation particulier au test et bien proche de test réel, n'hésitez plus d'ajouter la Q&A au panier.

Pass4Test est un bon catalyseur du succès pour les professionnels IT. Beaucoup de gens passer le test GIAC GCIA avec l'aide de l'outil formation. Les experts profitent leurs expériences riches et connaissances à faire sortir la Q&A GIAC GCIA plus nouvelle qui comprend les exercices de pratiquer et le test simulation. Vous pouvez passer le test GIAC GCIA plus facilement avec la Q&A de Pass4Test.

GCIA Démo gratuit à télécharger: http://www.pass4test.fr/GCIA.html

NO.1 Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
A. It develops a new signature to find vulnerabilities.
B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans,
CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors
and system vulnerabilities, and DDoS clients.
C. It encrypts the log file using the 256 bit AES encryption scheme algorithm.
D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such
as NFS or Napster connections.
Answer: A,B,D

GIAC   GCIA examen   GCIA   GCIA

NO.2 Which of the following is known as a message digest?
A. Hash function
B. Hashing algorithm
C. Spider
D. Message authentication code
Answer: A

GIAC   certification GCIA   GCIA   GCIA   GCIA examen

NO.3 Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to
secure access to the network of the company from all possible entry points. He segmented the network
into several subnets and installed firewalls all over the network. He has placed very stringent rules on all
the firewalls, blocking everything in and out except ports that must be used.
He does need to have port 80 open since his company hosts a website that must be accessed from the
Internet. Adam is still worried about programs like Hping2 that can get into a network through covert
channels.
Which of the following is the most effective way to protect the network of the company from an attacker
using Hping2 to scan his internal network?
A. Block ICMP type 13 messages
B. Block all outgoing traffic on port 21
C. Block all outgoing traffic on port 53
D. Block ICMP type 3 messages
Answer: A

GIAC   GCIA   GCIA   GCIA   certification GCIA   GCIA examen

NO.4 Which of the following methods is a behavior-based IDS detection method?
A. Knowledge-based detection
B. Protocol detection
C. Statistical anomaly detection
D. Pattern matching detection
Answer: C

GIAC   GCIA   GCIA   certification GCIA

NO.5 Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
A. TRACERT
B. Ping
C. IPCONFIG
D. Netstat
Answer: A,B

GIAC   certification GCIA   GCIA

NO.6 Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.
A. It can detect events scattered over the network.
B. It can handle encrypted and unencrypted traffic equally.
C. It cannot detect events scattered over the network.
D. It is a technique that allows multiple computers to share one or more IP addresses.
Answer: B,C

certification GIAC   certification GCIA   GCIA   GCIA examen

NO.7 Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet
forum for online discussion. When a user visits the infected Web page, code gets automatically executed
and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?
A. Document Object Model (DOM)
B. Non persistent
C. SAX
D. Persistent
Answer: D

GIAC examen   GCIA   GCIA   GCIA

NO.8 This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a,
802.11b, and 802.11g standards. The main features of these tools are as follows: -It displays the signal
strength of a wireless network, MAC address, SSID, channel details, etc. -It is commonly used for the
following purposes:
A. War driving
B. Detecting unauthorized access points
C. Detecting causes of interference on a WLAN
D. WEP ICV error tracking
E. Making Graphs and Alarms on 802.11 Data, including Signal Strength
Answer: D

certification GIAC   certification GCIA   GCIA examen   GCIA

NO.9 Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned
to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime.
Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of
the mobile phone. Which of the following tools is Adam using?
A. FAU
B. FTK Imager
C. Galleta
D. Device Seizure
Answer: D

GIAC   certification GCIA   GCIA

NO.10 Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
A. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the
intrusion detection/prevention systems guarding the network.
B. Attacker can gain access to the Web server in a DMZ and exploit the database.
C. Attacker managing to break the first firewall defense can access the internal network without breaking
the second firewall if it is different.
D. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany
Answer: A,B,D

GIAC examen   GCIA   GCIA

NO.11 Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
A. Tunneling proxy server
B. Reverse proxy server
C. Anonymous proxy server
D. Intercepting proxy server
Answer: D

certification GIAC   GCIA examen   certification GCIA   GCIA examen   GCIA

NO.12 John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite
fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Hybrid attack
C. Brute Force attack
D. Rule based attack
Answer: A,B,C

GIAC   GCIA   GCIA examen   certification GCIA

NO.13 You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000based
network. You want to verify the connectivity of a host in the network. Which of the following utilities will you
use?
A. PING
B. TELNET
C. NETSTAT
D. TRACERT
Answer: A

GIAC   GCIA examen   GCIA   GCIA   GCIA   GCIA

NO.14 Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on
Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew
wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X.
Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?
A. LILO
B. BootX
C. NT Loader
D. GRUB
Answer: B

GIAC   certification GCIA   GCIA examen   GCIA examen

NO.15 Which of the following file systems is designed by Sun Microsystems?
A. NTFS
B. CIFS
C. ZFS
D. ext2
Answer: C

certification GIAC   GCIA   GCIA examen

NO.16 You are the Network Administrator for a large corporate network. You want to monitor all network traffic
on your local network for suspicious activities and receive a notification when a possible attack is in
process. Which of the following actions will you take for this?
A. Enable verbose logging on the firewall
B. Install a network-based IDS
C. Install a DMZ firewall
D. Install a host-based IDS
Answer: B

GIAC examen   GCIA   certification GCIA   certification GCIA   GCIA

NO.17 Which of the following Web attacks is performed by manipulating codes of programming languages
such as SQL, Perl, Java present in the Web pages?
A. Command injection attack
B. Code injection attack
C. Cross-Site Request Forgery
D. Cross-Site Scripting attack
Answer: B

certification GIAC   GCIA   GCIA   GCIA   certification GCIA   GCIA examen

NO.18 SSH is a network protocol that allows data to be exchanged between two networks using a secure
channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
A. Blowfish
B. IDEA
C. DES
D. RC4
Answer: A,B,C

certification GIAC   GCIA   GCIA examen   GCIA   GCIA examen

NO.19 Which of the following is the default port for Simple Network Management Protocol (SNMP)?
A. TCP port 110
B. TCP port 25
C. TCP port 80
D. UDP port 161
Answer: D

GIAC examen   GCIA   GCIA examen   GCIA   GCIA examen

NO.20 Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP
networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following
software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.
A. Basic Analysis and Security Engine (BASE)
B. sguil
C. KFSensor
D. OSSIM
Answer: A,B,D

GIAC   GCIA   certification GCIA   GCIA   GCIA

NO.21 Which of the following tools performs comprehensive tests against web servers for multiple items,
including over 6100 potentially dangerous files/CGIs?
A. Dsniff
B. Snort
C. Nikto
D. Sniffer
Answer: C

certification GIAC   certification GCIA   GCIA examen

NO.22 Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a
suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review
to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
A. Checkpoint files
B. EDB and STM database files
C. Temporary files
D. cookie files
Answer: A,B,C

GIAC   GCIA examen   certification GCIA   GCIA   GCIA examen

NO.23 Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer
runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He
knows that in Windows operating system, the data is searched in pre-defined steps for proper and
efficient analysis. Which of the following is the correct order for searching data on a Windows based
system?
A. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces
B. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces
C. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
D. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
Answer: B

certification GIAC   GCIA   GCIA   GCIA examen   GCIA

NO.24 Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of
resource records will she use to accomplish this.?
A. ANAME
B. SOA
C. MX
D. CNAME
Answer: C

GIAC examen   GCIA   GCIA examen   GCIA   GCIA examen

NO.25 You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is
configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion
detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of
the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters
Properties dialog box is not enabled.
B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box
is not selected.
C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters
Properties dialog box is not enabled.
D. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties
dialog box is not selected.
Answer: D

GIAC   certification GCIA   certification GCIA   GCIA examen

NO.26 Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with
his first project. Adam collected all required evidences and clues. He is now required to write an
investigative report to present before court for further prosecution of the case. He needs guidelines to
write an investigative report for expressing an opinion. Which of the following are the guidelines to write
an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.
A. All ideas present in the investigative report should flow logically from facts to conclusions.
B. Opinion of a lay witness should be included in the investigative report.
C. The investigative report should be understandable by any reader.
D. There should not be any assumptions made about any facts while writing the investigative report.
Answer: A,C,D

GIAC   certification GCIA   GCIA   certification GCIA

NO.27 Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to
him to investigate a computer, which is used by the suspect to sexually harass the victim using instant
messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover
password from instant messenger program, which suspect is using, to collect the evidence of the crime.
Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish
the task?
A. Asterisk Logger
B. Access PassView
C. Mail Pass View
D. MessenPass
Answer: D

certification GIAC   certification GCIA   GCIA   certification GCIA   GCIA examen

NO.28 Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
A. Limiting the amount of network bandwidth.
B. Blocking IP address.
C. Using LM hashes for passwords.
D. Using Intrusion detection systems.
E. Using the network-ingress filtering.
Answer: A,B,D,E

GIAC   GCIA   GCIA   GCIA examen   GCIA examen   GCIA

NO.29 Mark works as a Network Security Administrator for BlueWells Inc. The company has a
Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited
employees of the company. His presentation is about the External threats that the company recently faced
in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
A. These are the threats that originate from outside an organization in which the attacker attempts to gain
unauthorized access.
B. These are the threats that originate from within the organization.
C. These are the threats intended to flood a network with large volumes of access requests.
D. These threats can be countered by implementing security controls on the perimeters of the network,
such as firewalls, which limit user access to the Internet.
Answer: A,C,D

GIAC examen   GCIA examen   GCIA   GCIA

NO.30 You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6
network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly
routable address. Which of the following types of addresses will you choose?
A. Site-local
B. Global unicast
C. Local-link
D. Loopback
Answer: B

certification GIAC   certification GCIA   certification GCIA

Si vous hésitez encore à nous choisir, vous pouvez tout d'abord télécharger le démo gratuit dans le site Pass4Test pour connaître mieux la fiabilité de Pass4Test. Nous avons la confiance à vous promettre que vous allez passer le test GIAC GCIA à la première fois.

L'avènement de la certification GIAC pratique d'examen GPEN questions et réponses

Le test GIAC GPEN est bien populaire dans l'Industrie IT. Mais ça coûte beaucoup de temps pour bien préparer le test. Le temps est certainemetn la fortune dans cette société. L'outil de formation offert par Pass4Test ne vous demande que 20 heures pour renforcer les connaissances essentales pour le test GIAC GPEN. Vous aurez une meilleure préparation bien que ce soit la première fois à participer le test.

Le test simulation offert par Pass4Test est bien proche du test réel. Vous pouvez apprendre tous essences d'un test réel à courte terme avec l'aide de Pass4Test. Pass4Test peut vous assurer le succès 100% de test GIAC GPEN.

Code d'Examen: GPEN
Nom d'Examen: GIAC (GIAC Certified Penetration Tester)
Questions et réponses: 384 Q&As

Les produits de Pass4Test sont préparés pour le test Certification GIAC GPEN, y compris les formations et les informations ciblées au test GIAC GPEN. D'ailleurs, la Q&A de Pass4Test qui est impressionnée par la grande couverture des questions et la haute précision des réponses vous permet à réussir le test avec une haute note.

Choisissez le Pass4Test, choisissez le succès. Le produit offert par Pass4Test vous permet à réussir le test GIAC GPEN. C'est necessaire de prendre un test simulation avant participer le test réel. C'est une façon bien effective. Choisir Pass4Test vous permet à réussir 100% le test.

Pass4Test est un site qui peut réalise le rêve de beaucoup de professionnels. Pass4Test peut vous donner un coup de main pour réussir le test Certification GIAC GPEN via son guide d'étude. Est-ce que vous vous souciez de test Certification GIAC GPEN? Est-ce que vous êtes en cours de penser à chercher quelques Q&As à vous aider? Pass4Test peut résoudre ces problèmes. Les documentations offertes par Pass4Test peuvent vous provider une préparation avant le test plus efficace. Le test de simulation de Pass4Test est presque le même que le test réel. Étudier avec le guide d'étude de Pass4Test, vous pouvez passer le test avec une haute note.

GPEN Démo gratuit à télécharger: http://www.pass4test.fr/GPEN.html

NO.1 Which of the following statements are true about KisMAC?
A. Data generated by KisMAC can also be saved in pcap format.
B. It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.
C. It scans for networks passively on supported cards.
D. It is a wireless network discovery tool for Mac OS X.
Answer: A,C,D

GIAC   GPEN examen   certification GPEN   GPEN

NO.2 Which of the following options holds the strongest password?
A. california
B. $#164aviD

GIAC meilleur examen GSNA, questions et réponses

Vous pouvez télécharger le démo gratuit pour prendre un essai. Vous aurez plus confiance sur Pass4Test. N'hésitez plus à choisir la Q&A GIAC GSNA comme votre guide d'étude.

Si vous êtes intéressé par l'outil formation GIAC GSNA étudié par Pass4Test, vous pouvez télécharger tout d'abord le démo. Le service de la mise à jour gratuite pendant un an est aussi offert pour vous.

La Q&A GIAC GSNA de Pass4Test est liée bien avec le test réel de GIAC GSNA. La mise à jour gratuite est pour vous après vendre. Nous avons la capacité à vous assurer le succès de test GIAC GSNA 100%. Si malheureusement vous échouerez le test, votre argent sera tout rendu.

Code d'Examen: GSNA
Nom d'Examen: GIAC (GIAC Systems and Network Auditor)
Questions et réponses: 368 Q&As

Le test simulation offert par Pass4Test est bien proche du test réel. Vous pouvez apprendre tous essences d'un test réel à courte terme avec l'aide de Pass4Test. Pass4Test peut vous assurer le succès 100% de test GIAC GSNA.

Le Pass4Past possède une équipe d'élite qui peut vous offrir à temps les matériaux de test Certification GIAC GSNA. En même temps, nos experts font l'accent à mettre rapidement à jour les Questions de test Certification IT. L'important est que Pass4Test a une très bonne réputation dans l'industrie IT. Bien que l'on n'ait pas beaucoup de chances à réussir le test de GSNA, Pass4Test vous assure à passer ce test par une fois grâce à nos documentations avec une bonne précision et une grande couverture.

Bien qu'Il y ait plein de talentueux dans cette société, il manque beaucoup de professionnels dans les domaine en cours de développement, l'Industrie IT est l'un de ces domaines. Donc le test GIAC GSNA est un bon l'examination de technique informatique. Pass4Test est un site d'offrir la formation particulière au test GIAC GSNA.

GSNA Démo gratuit à télécharger: http://www.pass4test.fr/GSNA.html

NO.1 George works as an office assistant in Soft Well Inc. The company uses the Windows Vista operating
system. He wants to disable a program running on a computer. Which of the following Windows Defender
tools will he use to accomplish the task?
A. Allowed items
B. Quarantined items
C. Options
D. Software Explorer
Answer: D

certification GIAC   GSNA   GSNA   GSNA   certification GSNA

NO.2 Which of the following statements about the traceroute utility are true?
A. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of
each gateway along the route to the remote host.
B. It records the time taken for a round trip for each packet at each router.
C. It is an online tool that performs polymorphic shell code attacks.
D. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell
code cannot be recognized by any Intrusion Detection Systems.
Answer: A,B

certification GIAC   certification GSNA   certification GSNA   certification GSNA   certification GSNA

NO.3 You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You
want to set some terminal characteristics and environment variables. Which of the following Unix
configuration files can you use to accomplish the task?
A. /etc/sysconfig/routed
B. /proc/net
C. /etc/sysconfig/network-scripts/ifcfg-interface
D. /etc/sysconfig/init
Answer: D

certification GIAC   GSNA   certification GSNA

NO.4 A Web developer with your company wants to have wireless access for contractors that come in to
work on various projects. The process of getting this approved takes time. So rather than wait, he has put
his own wireless router attached to one of the network ports in his department. What security risk does
this present?
A. None, adding a wireless access point is a common task and not a security risk.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. An unauthorized WAP is one way for hackers to get into a network.
Answer: D

certification GIAC   GSNA   GSNA   GSNA   GSNA

NO.5 Which of the following tools works both as an encryption-cracking tool and as a keylogger?
A. Magic Lantern
B. KeyGhost Keylogger
C. Alchemy Remote Executor
D. SocketShield
Answer: A

GIAC   GSNA examen   certification GSNA   GSNA

NO.6 Which of the following allows the use of multiple virtual servers using different DNS names resolved by
the same IP address?
A. HTTP 1.1
B. JAVA
C. HTML
D. VPN
Answer: A

GIAC   GSNA   GSNA   GSNA

NO.7 You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You
want to print the super block and block the group information for the filesystem present on a system.
Which of the following Unix commands can you use to accomplish the task?
A. e2fsck
B. dump
C. dumpe2fs
D. e2label
Answer: C

GIAC   GSNA   GSNA examen

NO.8 You work as a Network Administrator for XYZ CORP. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows Server
2003. The company's management has decided to provide laptops to its sales team members. These
laptops are equipped with smart card readers. The laptops will be configured as wireless network clients.
You are required to accomplish the following tasks: The wireless network communication should be
secured. The laptop users should be able to use smart cards for getting authenticated. In order to
accomplish the tasks, you take the following steps: Configure 802.1x and WEP for the wireless
connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you
have taken these steps?
A. Both tasks will be accomplished.
B. The laptop users will be able to use smart cards for getting authenticated.
C. The wireless network communication will be secured.
D. None of the tasks will be accomplished.
Answer: C

GIAC   certification GSNA   GSNA

NO.9 You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While
auditing the company's network, you are facing problems in searching the faults and other entities that
belong to it. Which of the following risks may occur due to the existence of these problems?
A. Residual risk
B. Inherent risk
C. Secondary risk
D. Detection risk
Answer: D

GIAC examen   GSNA examen   certification GSNA   GSNA

NO.10 Which of the following is Microsoft's implementation of the file and application server for the Internet
and private intranets?
A. Internet Server Service (ISS)
B. Internet Server (IS)
C. WWW Server (WWWS)
D. Internet Information Server (IIS)
Answer: D

GIAC   GSNA examen   GSNA   GSNA examen   GSNA

NO.11 John works as a professional Ethical Hacker. He has been assigned the project of testing the security of
www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the Weare-secure network.
Which of the following IEEE-based traffic can be sniffed with Kismet?
A. 802.11g
B. 802.11n
C. 802.11b
D. 802.11a
Answer: A,B,C,D

certification GIAC   GSNA   GSNA   GSNA

NO.12 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He wants to forward all the kernel
messages to the remote host having IP address 192.168.0.1. Which of the following changes will he
perform in the syslog.conf file to accomplish the task?
A. kern.* @192.168.0.1
B. !*.* @192.168.0.1
C. !kern.* @192.168.0.1
D. *.* @192.168.0.1
Answer: A

GIAC   certification GSNA   certification GSNA   certification GSNA   GSNA examen

NO.13 John works as a contract Ethical Hacker. He has recently got a project to do security checking for
www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the
information gathering step. Which of the following commands will he use to accomplish the task? (Choose
two)
A. nc 208.100.2.25 23
B. nmap -v -O www.we-are-secure.com
C. nc -v -n 208.100.2.25 80
D. nmap -v -O 208.100.2.25
Answer: B,D

GIAC examen   certification GSNA   certification GSNA   GSNA examen   GSNA

NO.14 John works as a Security Professional. He is assigned a project to test the security of www.we-
are-secure.com. John wants to get the information of all network connections and listening ports in the
numerical form. Which of the following commands will he use?
A. netstat -e
B. netstat r
C. netstat -s
D. netstat an
Answer: D

GIAC   certification GSNA   GSNA   GSNA examen

NO.15 Which of the following is a wireless auditing tool that is used to pinpoint the actual physical location of
wireless devices in the network?
A. KisMAC
B. Ekahau
C. Kismet
D. AirSnort
Answer: B

GIAC   GSNA   certification GSNA

NO.16 Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah
wants greater control over the appearance and presentation of Web pages. She wants the ability to
precisely specify the display attributes and the appearance of elements on the Web pages. How will she
accomplish this?
A. Use the Database Design wizard.
B. Make two templates, one for the index page and the other for all other pages.
C. Use Cascading Style Sheet (CSS).
D. Make a template and use it to create each Web page.
Answer: C

GIAC   GSNA examen   GSNA

NO.17 You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest single
domain network. You have installed a Windows Server 2008 computer. You have configured auditing on
this server. The client computers of the company use the Windows XP Professional operating system.
You want to audit each event that is related to a user managing an account in the user database on the
computer where the auditing is configured. To accomplish the task, you have enabled the Audit account
management option on the server. Which of the following events can be audited by enabling this audit
option.?
A. Access to an Active Directory object
B. Change of password for a user account
C. Addition of a user account to a group
D. Creation of a user account
Answer: B,C,D

GIAC examen   certification GSNA   GSNA examen   GSNA

NO.18 You run the wc -c file1.txt command. If this command displays any error message, you want to store the
error message in the error.txt file. Which of the following commands will you use to accomplish the task?
A. wc -c file1.txt >>error.txt
B. wc -c file1.txt 1>error.txt
C. wc -c file1.txt 2>error.txt
D. wc -c file1.txt >error.txt
Answer: C

GIAC examen   certification GSNA   certification GSNA   GSNA examen

NO.19 Which of the following statements are true about locating rogue access points using WLAN discovery
software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi
compliant MiniPCI card? (Choose two)
A. These tools can determine the rogue access point even when it is attached to a wired network.
B. These tools can determine the authorization status of an access point.
C. These tools cannot detect rogue access points if the victim is using data encryption.
D. These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.
Answer: B,D

GIAC examen   GSNA   GSNA   GSNA   GSNA

NO.20 You check performance logs and note that there has been a recent dramatic increase in the amount of
broadcast traffic. What is this most likely to be an indicator of?
A. Misconfigured router
B. DoS attack
C. Syn flood
D. Virus
Answer: B

certification GIAC   certification GSNA   GSNA examen

Quand vous hésitez même à choisir Pass4Test, le démo gratuit dans le site Pass4Test est disponible pour vous à essayer avant d'acheter. Nos démos vous feront confiant à choisir Pass4Test. Pass4Test est votre meilleur choix à passer l'examen de Certification GIAC GSNA, et aussi une meilleure assurance du succès du test GSNA. Vous choisissez Pass4Test, vous choisissez le succès.

2014年3月19日星期三

Dernières GIAC GCIH examen pratique questions et réponses

Pas besoin de beaucoup d'argent et de temps, vous pouvez passer le test GIAC GCIH juste avec la Q&A de GIAC GCIH offerte par Pass4Test qui vous offre le test simulation bien proche de test réel.

Un bon choix de l'outil à se former est le point essentiel à passer le test GIAC GCIH, et les documentations à propos de rechercher le test GIAC GCIH est toujours une part plus importante pendant la préparation de test Certification. Les Q&As offertes par les experts de Pass4Test sont presque même que les tests réels. Pass4Test est un site web particulièrement en apportant les facilités aux gens qui veulent passer le test Certification.

Dans l'Industrie IT, le certificat IT peut vous permet d'une space plus grande de se promouvoir. Généralement, la promotion de l'entreprise repose sur ce que vous avec la certification. Le Certificat GIAC GCIH est bien autorisé. Avec le certificat GIAC GCIH, vous aurez une meilleure carrière dans le future. Vous pouvez télécharger tout d'abord la partie gratuite de Q&A GIAC GCIH.

Pass4Test, où vous pouvez trouver les conseils et les documentations de test Certification GIAC GCIH, est un siteweb remarquable offrant les données à préparer le test IT. Les documentations partiels et les mis en nouveau sont offerts gratuitement dans le site de Pass4Test. D'ailleurs, nos experts profitent de leurs expériences et leurs efforts à lancer sans arrêts les Q&A plus proches au test réel. Vous allez passer votre examen plus facile.

Pass4Test possède une grande équipe composée des experts IT qui travaillent dur avec leurs riches expériences et connaissances pour produire un bon outil de formation. Selon les anciens test, le test simulation de Pass4Test est bien lié avec le test réel. Pass4Test peut vous assurer à réussir le test. Maintenant vous ajoutez votre outil de formation au panier, et votre rêve réalisera bien tôt.

Code d'Examen: GCIH
Nom d'Examen: GIAC (GIAC Certified Incident Handler)
Questions et réponses: 335 Q&As

Nous sommes clairs que ce soit necessaire d'avoir quelques certificats IT dans cette industrie de plus en plus intense. Le Certificat IT est une bonne examination des connaissances démandées. Dans l'Industrie IT, le test GIAC GCIH est une bonne examination. Mais c'est difficile à passer le test GIAC GCIH. Pour améliorer le travail dans le future, c'est intélligent de prendre une bonne formation en coûtant un peu d'argent. Vous allez passer le test 100% en utilisant le Pass4Test. Votre argent sera tout rendu si votre test est raté.

Dans n'importe quelle industrie, tout le monde espère une meilleure occasion de se promouvoir, surtout dans l'industrie de IT. Les professionnelles dans l'industrie IT ont envie d'une plus grande space de se développer. Le Certificat GIAC GCIH peut réaliser ce rêve. Et Pass4Test peut vous aider à réussir le test GIAC GCIH.

GCIH Démo gratuit à télécharger: http://www.pass4test.fr/GCIH.html

NO.1 Which of the following statements are true about worms?
Each correct answer represents a complete solution. Choose all that apply.
A. Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or
modify files on a targeted computer.
B. Worms can exist inside files such as Word or Excel documents.
C. One feature of worms is keystroke logging.
D. Worms replicate themselves from one system to another without using a host file.
Answer: A, B, D

GIAC examen   certification GCIH   GCIH examen   certification GCIH   GCIH

NO.2 Network mapping provides a security testing team with a blueprint of the organization. Which of the
following steps is NOT a part of manual network mapping?
A. Gathering private and public IP addresses
B. Collecting employees information
C. Banner grabbing
D. Performing Neotracerouting
Answer: D

certification GIAC   GCIH   certification GCIH   GCIH   GCIH

NO.3 John works as a professional Ethical Hacker. He has been assigned a project to test the security of
www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The
output of the scanning test is as follows:
C:\whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server.
Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
A. This vulnerability helps in a cross site scripting attack.
B. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the
attacker.
C. The countermeasure to 'printenv' vulnerability is to remove the CGI script.
D. With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other
malicious scripts.
Answer: A, C, D

certification GIAC   GCIH   GCIH examen

NO.4 John works as a professional Ethical Hacker. He has been assigned a project to test the security of
www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and
successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a
__________.
A. Dictionary attack
B. SQL injection attack
C. Replay attack
D. Land attack
Answer: B

GIAC   GCIH   GCIH examen   GCIH

NO.5 Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the
members of the incident response team. As a demo project he asked members of the incident response
team to perform the following actions:
Remove the network cable wires.
Isolate the system on a separate VLAN.
Use a firewall or access lists to prevent communication into or out of the system.
Change DNS entries to direct traffic away from compromised system.
Which of the following steps of the incident handling process includes the above actions?
A. Identification
B. Containment
C. Eradication
D. Recovery
Answer: B

GIAC   GCIH examen   GCIH   GCIH examen   GCIH

NO.6 Which of the following commands is used to access Windows resources from Linux workstation?
A. mutt
B. scp
C. rsync
D. smbclient
Answer: D

GIAC examen   certification GCIH   GCIH   GCIH examen   GCIH

NO.7 Which of the following applications is an example of a data-sending Trojan?
A. SubSeven
B. Senna Spy Generator
C. Firekiller 2000
D. eBlaster
Answer: D

GIAC examen   GCIH   GCIH examen   GCIH   certification GCIH

NO.8 Adam has installed and configured his wireless network. He has enabled numerous security features
such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless
router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and
sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds
out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the
router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?
A. NAT spoofing
B. DNS cache poisoning
C. MAC spoofing
D. ARP spoofing
Answer: C

certification GIAC   GCIH examen   certification GCIH   GCIH

NO.9 Which of the following types of attack can guess a hashed password?
A. Brute force attack
B. Evasion attack
C. Denial of Service attack
D. Teardrop attack
Answer: A

GIAC examen   certification GCIH   GCIH

NO.10 Choose and reorder the steps of an incident handling process in their correct order.
A.
Answer: A

certification GIAC   GCIH   GCIH

NO.11 Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.
A. tcp wrapper provides access control, host address spoofing, client username lookups, etc.
B. When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running
the server program directly.
C. tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as
tokens to filter for access control purposes.
D. tcp wrapper protects a Linux server from IP address spoofing.
Answer: A, B, C

GIAC examen   certification GCIH   GCIH

NO.12 John works as a Professional Penetration Tester. He has been assigned a project to test the Website
security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters ='or''=' as a
username and successfully logs on to the user page of the Web site. Now, John asks the we-aresecure
Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve
the security of the we-are-secure Website login page from the SQL injection attack?
A. Use the escapeshellarg() function
B. Use the session_regenerate_id() function
C. Use the mysql_real_escape_string() function for escaping input
D. Use the escapeshellcmd() function
Answer: C

certification GIAC   GCIH   GCIH

NO.13 Adam, a novice computer user, works primarily from home as a medical professional. He just bought a
brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his
new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software,
anti-spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of
working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a
window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up,
even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free
space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd.
Which of the following is the mostly likely the cause of the problem.?
A. Computer is infected with the stealth kernel level rootkit.
B. Computer is infected with stealth virus.
C. Computer is infected with the Stealth Trojan Virus.
D. Computer is infected with the Self-Replication Worm.
Answer: A

GIAC examen   certification GCIH   GCIH

NO.14 Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary
attack?
A. Whishker
B. Nessus
C. SARA
D. Nmap
Answer: B

GIAC examen   GCIH examen   GCIH   certification GCIH   GCIH   GCIH examen

NO.15 Which of the following types of attacks is the result of vulnerabilities in a program due to poor
programming techniques?
A. Evasion attack
B. Denial-of-Service (DoS) attack
C. Ping of death attack
D. Buffer overflow attack
Answer: D

GIAC   GCIH   GCIH   GCIH examen

NO.16 Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All
computers run on Windows XP. Manager of the Sales department complains Adam about the unusual
behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his
computer overnight. Adam suspects that some malicious software or Trojans have been installed on the
computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346,
and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one
application to run every time when Windows start.
Which of the following is the most likely reason behind this issue?
A. Cheops-ng is installed on the computer.
B. Elsave is installed on the computer.
C. NetBus is installed on the computer.
D. NetStumbler is installed on the computer.
Answer: C

certification GIAC   GCIH examen   GCIH   GCIH

NO.17 John works as a professional Ethical Hacker. He has been assigned the project of testing the security
of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a
countermeasure, he suggests that the Network Administrator should remove the IPP printing capability
from the server. He is suggesting this as a countermeasure against __________.
A. IIS buffer overflow
B. NetBIOS NULL session
C. SNMP enumeration
D. DNS zone transfer
Answer: A

certification GIAC   GCIH   certification GCIH   GCIH examen

NO.18 Which of the following types of attacks is only intended to make a computer resource unavailable to its
users?
A. Denial of Service attack
B. Replay attack
C. Teardrop attack
D. Land attack
Answer: A

GIAC examen   GCIH   GCIH   GCIH examen   GCIH examen

NO.19 You have configured a virtualized Internet browser on your Windows XP professional computer. Using
the virtualized Internet browser, you can protect your operating system from which of the following?
A. Brute force attack
B. Mail bombing
C. Distributed denial of service (DDOS) attack
D. Malware installation from unknown Web sites
Answer: D

certification GIAC   GCIH   GCIH   certification GCIH   GCIH

NO.20 Fill in the blank with the appropriate word.
StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use
______ defense against buffer overflow attacks.
A. canary
Answer: A

GIAC   GCIH   GCIH examen   GCIH

NO.21 Which of the following statements are true about a keylogger?
Each correct answer represents a complete solution. Choose all that apply.
A. It records all keystrokes on the victim's computer in a predefined log file.
B. It can be remotely installed on a computer system.
C. It is a software tool used to trace all or specific activities of a user on a computer.
D. It uses hidden code to destroy or scramble data on the hard disk.
Answer: A, B, C

GIAC   GCIH examen   GCIH examen   GCIH   GCIH examen

NO.22 You see the career section of a company's Web site and analyze the job profile requirements. You
conclude that the company wants professionals who have a sharp knowledge of Windows server 2003
and Windows active directory installation and placement. Which of the following steps are you using to
perform hacking?
A. Scanning
B. Covering tracks
C. Reconnaissance
D. Gaining access
Answer: C

certification GIAC   certification GCIH   GCIH

NO.23 Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet
forum for online discussion. When a user visits the infected Web page, code gets automatically executed
and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of
Cross-Site Scripting attack Ryan intends to do?
A. Non persistent
B. Document Object Model (DOM)
C. SAX
D. Persistent
Answer: D

certification GIAC   GCIH   GCIH   certification GCIH

NO.24 Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer
overflow occurs when a particular operation/function writes more data into a variable than the variable
was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
A. Dynamic buffer overflows
B. Stack based buffer overflow
C. Heap based buffer overflow
D. Static buffer overflows
Answer: B, C

GIAC   GCIH examen   certification GCIH   GCIH   certification GCIH

NO.25 Which of the following statements about buffer overflow is true?
A. It manages security credentials and public keys for message encryption.
B. It is a collection of files used by Microsoft for software updates released between major service pack
releases.
C. It is a condition in which an application receives more data than it is configured to accept.
D. It is a false warning about a virus.
Answer: C

certification GIAC   GCIH   GCIH examen   GCIH

NO.26 In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to
the target system?
A. Ping of death
B. Jolt
C. Fraggle
D. Teardrop
Answer: A

GIAC examen   GCIH   GCIH

NO.27 Which of the following statements about Denial-of-Service (DoS) attack are true?
Each correct answer represents a complete solution. Choose three.
A. It disrupts services to a specific computer.
B. It changes the configuration of the TCP/IP protocol.
C. It saturates network resources.
D. It disrupts connections between two computers, preventing communications between services.
Answer: A, C, D

GIAC examen   GCIH   GCIH   GCIH   certification GCIH

NO.28 Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
A. Freeze the scene.
B. Repair any damage caused by an incident.
C. Prevent any further damage.
D. Inform higher authorities.
Answer: A, B, C

GIAC   GCIH   GCIH   GCIH

NO.29 Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not
concerned about being stealth at this point.
Which of the following type of scans would be most accurate and reliable?
A. UDP sacn
B. TCP Connect scan
C. ACK scan
D. Fin scan
Answer: B

GIAC examen   GCIH   GCIH   certification GCIH   certification GCIH

NO.30 Which of the following is a technique of using a modem to automatically scan a list of telephone
numbers, usually dialing every number in a local area code to search for computers, Bulletin board
systems, and fax machines?
A. Demon dialing
B. Warkitting
C. War driving
D. Wardialing
Answer: D

GIAC examen   certification GCIH   GCIH   certification GCIH   GCIH examen   GCIH

Le Certificat de GIAC GCIH peut vous aider à monter un autre degré de votre carrière, même que votre niveau de vie sera amélioré. Avoir un Certificat GIAC GCIH, c'est-à-dire avoir une grande fortune. Le Certificat GIAC GCIH peut bien tester des connaissances professionnelles IT. La Q&A GIAC GCIH plus nouvelle vient de sortir qui peut vous aider à faciilter le cours de test préparation. Notre Q&A comprend les meilleurs exercices, test simulation et les réponses.

Les meilleures GIAC GSNA examen pratique questions et réponses

Choisir le Pass4Test vous permet non seulement à réussir le test GIAC GSNA, mais encore à enjouir le service en ligne 24h et la mise à jour gratuite pendant un an. Nous allons lancer au premier temps la Q&A GIAC GSNA plus nouvelle. Si vous ne passez pas le test, votre argent sera tout rendu.

Aujourd'hui, il y a pleine de professionnels IT dans cette société. Ces professionnels sont bien populaires mais ils ont à être en face d'une grande compétition. Donc beaucoup de professionnels IT se prouver par les tests de Certification très difficile à réussir. Pass4Test est voilà pour offrir un raccourci au succès de test Certification.

Code d'Examen: GSNA
Nom d'Examen: GIAC (GIAC Systems and Network Auditor)
Questions et réponses: 368 Q&As

La Q&A GIAC GSNA est étudiée par les experts de Pass4Test qui font tous effort en profitant leurs connaissances professionnelles. La Q&A de Pass4Test est ciblée aux candidats de test IT Certification. Vous voyez peut-être les Q&As similaires dansn les autres site web, mais il n'y a que Pass4Test d'avoir le guide d'étude plus complet. C'est le meilleur choix à s'assurer le succès de test Certification GIAC GSNA.

Pass4Test est un site de vous ramener au succès. Pass4Test peut vous aider à promouvoir les connaissances essentielles pour le test GIAC GSNA et passer le test à la première fois.

GSNA Démo gratuit à télécharger: http://www.pass4test.fr/GSNA.html

NO.1 Which of the following is Microsoft's implementation of the file and application server for the Internet
and private intranets?
A. Internet Server Service (ISS)
B. Internet Server (IS)
C. WWW Server (WWWS)
D. Internet Information Server (IIS)
Answer: D

GIAC examen   certification GSNA   certification GSNA   GSNA   certification GSNA

NO.2 A Web developer with your company wants to have wireless access for contractors that come in to
work on various projects. The process of getting this approved takes time. So rather than wait, he has put
his own wireless router attached to one of the network ports in his department. What security risk does
this present?
A. None, adding a wireless access point is a common task and not a security risk.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. An unauthorized WAP is one way for hackers to get into a network.
Answer: D

certification GIAC   GSNA   GSNA examen   GSNA

NO.3 You work as a Network Administrator for XYZ CORP. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows Server
2003. The company's management has decided to provide laptops to its sales team members. These
laptops are equipped with smart card readers. The laptops will be configured as wireless network clients.
You are required to accomplish the following tasks: The wireless network communication should be
secured. The laptop users should be able to use smart cards for getting authenticated. In order to
accomplish the tasks, you take the following steps: Configure 802.1x and WEP for the wireless
connections. Configure the PEAP-MS-CHAP v2 protocol for authentication. What will happen after you
have taken these steps?
A. Both tasks will be accomplished.
B. The laptop users will be able to use smart cards for getting authenticated.
C. The wireless network communication will be secured.
D. None of the tasks will be accomplished.
Answer: C

GIAC   GSNA examen   GSNA examen   GSNA   GSNA   GSNA examen

NO.4 Which of the following statements about the traceroute utility are true?
A. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of
each gateway along the route to the remote host.
B. It records the time taken for a round trip for each packet at each router.
C. It is an online tool that performs polymorphic shell code attacks.
D. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell
code cannot be recognized by any Intrusion Detection Systems.
Answer: A,B

certification GIAC   GSNA   certification GSNA   GSNA examen   GSNA examen

NO.5 Which of the following tools works both as an encryption-cracking tool and as a keylogger?
A. Magic Lantern
B. KeyGhost Keylogger
C. Alchemy Remote Executor
D. SocketShield
Answer: A

GIAC examen   certification GSNA   GSNA examen   GSNA examen

NO.6 John works as a Security Professional. He is assigned a project to test the security of www.we-
are-secure.com. John wants to get the information of all network connections and listening ports in the
numerical form. Which of the following commands will he use?
A. netstat -e
B. netstat r
C. netstat -s
D. netstat an
Answer: D

certification GIAC   GSNA   certification GSNA   GSNA

NO.7 You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. While
auditing the company's network, you are facing problems in searching the faults and other entities that
belong to it. Which of the following risks may occur due to the existence of these problems?
A. Residual risk
B. Inherent risk
C. Secondary risk
D. Detection risk
Answer: D

GIAC examen   certification GSNA   certification GSNA   GSNA examen

NO.8 You run the wc -c file1.txt command. If this command displays any error message, you want to store the
error message in the error.txt file. Which of the following commands will you use to accomplish the task?
A. wc -c file1.txt >>error.txt
B. wc -c file1.txt 1>error.txt
C. wc -c file1.txt 2>error.txt
D. wc -c file1.txt >error.txt
Answer: C

GIAC   GSNA examen   certification GSNA   GSNA

NO.9 Which of the following is a wireless auditing tool that is used to pinpoint the actual physical location of
wireless devices in the network?
A. KisMAC
B. Ekahau
C. Kismet
D. AirSnort
Answer: B

GIAC examen   GSNA   GSNA

NO.10 Which of the following allows the use of multiple virtual servers using different DNS names resolved by
the same IP address?
A. HTTP 1.1
B. JAVA
C. HTML
D. VPN
Answer: A

GIAC   GSNA   certification GSNA

NO.11 Which of the following statements are true about locating rogue access points using WLAN discovery
software such as NetStumbler, Kismet, or MacStumbler if you are using a Laptop integrated with Wi-Fi
compliant MiniPCI card? (Choose two)
A. These tools can determine the rogue access point even when it is attached to a wired network.
B. These tools can determine the authorization status of an access point.
C. These tools cannot detect rogue access points if the victim is using data encryption.
D. These tools detect rogue access points if the victim is using IEEE 802.11 frequency bands.
Answer: B,D

GIAC   GSNA   GSNA   GSNA

NO.12 George works as an office assistant in Soft Well Inc. The company uses the Windows Vista operating
system. He wants to disable a program running on a computer. Which of the following Windows Defender
tools will he use to accomplish the task?
A. Allowed items
B. Quarantined items
C. Options
D. Software Explorer
Answer: D

GIAC   GSNA examen   GSNA   GSNA examen   GSNA examen

NO.13 You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You
want to print the super block and block the group information for the filesystem present on a system.
Which of the following Unix commands can you use to accomplish the task?
A. e2fsck
B. dump
C. dumpe2fs
D. e2label
Answer: C

GIAC   GSNA   GSNA   GSNA examen   GSNA

NO.14 You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest single
domain network. You have installed a Windows Server 2008 computer. You have configured auditing on
this server. The client computers of the company use the Windows XP Professional operating system.
You want to audit each event that is related to a user managing an account in the user database on the
computer where the auditing is configured. To accomplish the task, you have enabled the Audit account
management option on the server. Which of the following events can be audited by enabling this audit
option.?
A. Access to an Active Directory object
B. Change of password for a user account
C. Addition of a user account to a group
D. Creation of a user account
Answer: B,C,D

GIAC   certification GSNA   GSNA   GSNA   GSNA   GSNA

NO.15 John works as a professional Ethical Hacker. He has been assigned the project of testing the security of
www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the Weare-secure network.
Which of the following IEEE-based traffic can be sniffed with Kismet?
A. 802.11g
B. 802.11n
C. 802.11b
D. 802.11a
Answer: A,B,C,D

GIAC   GSNA   GSNA examen

NO.16 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He wants to forward all the kernel
messages to the remote host having IP address 192.168.0.1. Which of the following changes will he
perform in the syslog.conf file to accomplish the task?
A. kern.* @192.168.0.1
B. !*.* @192.168.0.1
C. !kern.* @192.168.0.1
D. *.* @192.168.0.1
Answer: A

GIAC   GSNA examen   certification GSNA   certification GSNA

NO.17 John works as a contract Ethical Hacker. He has recently got a project to do security checking for
www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the
information gathering step. Which of the following commands will he use to accomplish the task? (Choose
two)
A. nc 208.100.2.25 23
B. nmap -v -O www.we-are-secure.com
C. nc -v -n 208.100.2.25 80
D. nmap -v -O 208.100.2.25
Answer: B,D

GIAC   GSNA examen   certification GSNA   GSNA

NO.18 Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah
wants greater control over the appearance and presentation of Web pages. She wants the ability to
precisely specify the display attributes and the appearance of elements on the Web pages. How will she
accomplish this?
A. Use the Database Design wizard.
B. Make two templates, one for the index page and the other for all other pages.
C. Use Cascading Style Sheet (CSS).
D. Make a template and use it to create each Web page.
Answer: C

GIAC   certification GSNA   GSNA   GSNA   GSNA examen

NO.19 You check performance logs and note that there has been a recent dramatic increase in the amount of
broadcast traffic. What is this most likely to be an indicator of?
A. Misconfigured router
B. DoS attack
C. Syn flood
D. Virus
Answer: B

GIAC   certification GSNA   certification GSNA   GSNA   certification GSNA   GSNA

NO.20 You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You
want to set some terminal characteristics and environment variables. Which of the following Unix
configuration files can you use to accomplish the task?
A. /etc/sysconfig/routed
B. /proc/net
C. /etc/sysconfig/network-scripts/ifcfg-interface
D. /etc/sysconfig/init
Answer: D

GIAC   certification GSNA   GSNA examen

GSNA est un test de GIAC Certification, donc réussir GSNA est le premier pas à mettre le pied sur la Certifiction GIAC. Ça peut expliquer certiainement pourquoi le test GIAC GSNA devient de plus en plus chaud, et il y a de plus en plus de gens qui veulent participer le test GSNA. Au contraire, il n'y a que pas beaucoup de gens qui pourrait réussir ce test. Dans ce cas, si vous vous réfléchissez étudier avec une bonne Q&A?

GIAC GSSP-NET examen pratique questions et réponses

Pass4Test est un bon site d'offrir la facilité aux candidats de test GIAC GSSP-NET. Selon les anciens test, l'outil de formation GIAC GSSP-NET est bien proche de test réel.

Il demande les connaissances professionnelles pour passer le test GIAC GSSP-NET. Si vous manquez encore ces connaissances, vous avez besoin de Pass4Test comme une resourece de ces connaissances essentielles pour le test. Pass4Test et ses experts peuvent vous aider à renfocer ces connaissances et vous offrir les Q&As. Pass4Test fais tous efforts à vous aider à se renforcer les connaissances professionnelles et à passer le test. Choisir le Pass4Test peut non seulement à obtenir le Certificat GIAC GSSP-NET, et aussi vous offrir le service de la mise à jour gratuite pendant un an. Si malheureusement, vous ratez le test, votre argent sera 100% rendu.

Code d'Examen: GSSP-NET
Nom d'Examen: GIAC (GIAC GIAC Secure Software Programmer - C#.NET )
Questions et réponses: 491 Q&As

Le succès n'est pas loin de vous si vous choisissez Pass4Test. Vous allez obtenir le Certificat de GIAC GSSP-NET très tôt. Pass4Test peut vous permettre à réussir 100% le test GIAC GSSP-NET, de plus, un an de service en ligne après vendre est aussi gratuit pour vous.

Il y a beaucoup de gans ambitieux dansn l'Industrie IT. Pour monter à une autre hauteur dans la carrière, et être plus proche du pic de l'Industrie IT. On peut choisir le test GIAC GSSP-NET à se preuver. Mais le taux du succès et bien bas. Participer le test GIAC GSSP-NET est un choix intelligent. Dans l'Industrie IT de plus en plus intense, on doit trouver une façon à s'améliorer. Vous pouvez chercher plusieurs façons à vous aider pour réussir le test.

La Q&A de Pass4Test vise au test Certificat GIAC GSSP-NET. L'outil de formation GIAC GSSP-NET offert par Pass4Test comprend les exercices de pratique et le test simulation. Vous pouvez trouver les autres sites de provider la Q&A, en fait vous allez découvrir que c'est l'outil de formation de Pass4Test qui offre les documentaions plus compètes et avec une meilleure qualité.

Aujourd'hui, c'est une société pleine de gens talentueux, la meilleure façon de suivre et assurer la place dans votre carrière est de s'améliorer sans arrêt. Si vous n'augmentez pas dans votre carrière, vous êtes juste sous-développé parce que les autres sont meilleurs que vous. Pour éviter ce cas, vous devez vous former successivement.

GSSP-NET Démo gratuit à télécharger: http://www.pass4test.fr/GSSP-NET.html

NO.1 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its
application development platform. You are creating an ASP.NET Web application using .NET Framework
3.5. The application will be used to share any type of photos on Internet. All the photos should be
accessible in various sizes and formats. You need to add a download feature that can be easily
maintained. You also need to make sure that only a single version of all photos is stored on a SQL server
database. What will you do?
A. Create an HttpModule class to determine the request for the photo download. Process the photo
according to the given format and size, and after that return the processed photo in the response.
B. Create a user control that converts the photo to the required format and size.
C. Create an HttpHandler class to determine the request for the photo download. Process the photo
according to the given format and size, and after that return the processed photo in the response.
D. Create an ActiveX control that converts the photo to the required format and size.
Answer: C

certification GIAC   certification GSSP-NET   certification GSSP-NET   certification GSSP-NET

NO.2 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its
application development platform. You create an ASP.NET Web application using .NET Framework 3.5.
You create a Web form in the application that permits users to provide personal information. You add a
DropDownList control to the Web form to retrieve the residential status of users. The default item that the
DropDownList control displays is the "Select Country" option. You have to ensure that users select a
country other than the default option. Which of the following validation controls should you use to
accomplish this task?
A. RangeValidator
B. RequiredFieldValidator
C. CustomValidator
D. RegularExpressionValidator
Answer: B

GIAC examen   GSSP-NET   GSSP-NET examen   certification GSSP-NET   GSSP-NET examen

NO.3 You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its
application development platform. You create an ASP.NET Web application using the .NET Framework
3.5. The application contains two HTML pages named Error.htm and
PageNotFound.htm. You want to make sure that the following requirements are met:
l When any user requests a page that does not exist, the PageNotFound.htm page is
displayed.
l When any other error occurs, the Error.htm page is displayed. Which of the following code segments will
you add to the Web.config file to accomplish this task?
A. <customErrors mode="On" defaultRedirect="Error.htm">
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
B. <customErrors mode="Off">
<error statusCode="400" redirect="Error.htm"/>
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
C. <customErrors mode="On">
<error statusCode="400" redirect="Error.htm"/>
<error statusCode="404" redirect="PageNotFound.htm"/> </customErrors>
D. <customErrors mode="Off" defaultRedirect="Error.htm"> <error statusCode="404"
redirect="PageNotFound.htm"/> </customErrors>
Answer: A

GIAC examen   GSSP-NET   GSSP-NET   certification GSSP-NET   GSSP-NET

NO.4 You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its
application development platform. You create an ASP.NET Web application using the .NET
Framework 3.5. You want to use a HTTP module called on each and every request made by the
application. It is called as part of the ASP.NET request pipeline. It has right to access life-cycle events
throughout the request. You also want to ensure that the HTTP module allows a user to inspect incoming
and outgoing requests and take appropriate action based on the request. What will be the correct order to
create the HTTP module?
A.
Answer: A

GIAC examen   GSSP-NET   GSSP-NET examen   certification GSSP-NET   GSSP-NET   GSSP-NET

NO.5 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application
development platform. You create a class library using the .NET Framework. The library will be used to
open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust
permission. You write down the following code segments for the socket connections:
SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);
permission.Assert();
A number of the applications that use the class library may not have the necessary permissions to open
the network socket connections. Therefore, you are required to withdraw the assertion. Which of the
following code segments will you use to accomplish the task?
A. permission.PermitOnly();
B. CodeAccessPermission.RevertDeny();
C. permission.Deny();
D. CodeAccessPermission.RevertAssert();
E. permission.Demand();
Answer: D

GIAC examen   GSSP-NET   certification GSSP-NET

NO.6 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its
application development platform. You create an application for the company. You need to validate the
phone number passed to a class as a parameter in the application. Which of the following is the most
effective way to verify that the format of the data matches a phone number.?
A. Regular expressions
B. Nested If statements
C. Use the String.Length property
D. A try/catch block
Answer: A

GIAC   GSSP-NET   GSSP-NET   GSSP-NET   GSSP-NET   certification GSSP-NET

NO.7 You work as a Software Developer for ABC Inc. The company has several branches worldwide. The
company uses Visual Studio.NET 2005 as its application development platform. You have recently
finished the development of an application using .NET Framework 2.0. The application can be used only
for cryptography. Therefore, you have implemented the application on a computer. What will you call the
computer that implemented cryptography?
A. Cryptographic toolkit
B. Cryptosystem
C. Cryptographer
D. Cryptanalyst
Answer: B

GIAC examen   GSSP-NET examen   certification GSSP-NET

NO.8 You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that
will handle information related to monthly sales of the company. You wish to secure the Web site so that
only employees of the Accounts department can view the Web pages. You need to create roles for the
employees of this department. The user account information will be stored in a SQL Server database
named Database. You decide to do all this by using the Web Site Administration Tool. Which of the
following types of security will you use to accomplish the task?
A. Forms-based authentication
B. Integrated Microsoft Windows authentication
C. Basic authentication
D. Digest authentication
Answer: A

GIAC   certification GSSP-NET   GSSP-NET   GSSP-NET examen   GSSP-NET   GSSP-NET

NO.9 You can use LINQ in an ASP.NET application through the LinqDataSource control, the __________
control, or by creating LINQ queries.
A. ADO.NET DataSet
B. ObjectDataSource
C. SqlDataSource
D. XmlDataSource
Answer: B

GIAC   GSSP-NET   certification GSSP-NET   certification GSSP-NET   GSSP-NET examen

NO.10 Which of the following techniques is used to transmit passwords during authentication?
A. Asymmetric encryption
B. Hashing
C. Salted Hash
D. Symmetric encryption
Answer: C

certification GIAC   GSSP-NET   GSSP-NET

NO.11 In .NET Framework 3.5, you can create and access values that persist from one application session to
another. What are these values called?
A. Objects
B. Settings
C. Properties
D. Attributes
Answer: B

certification GIAC   certification GSSP-NET   certification GSSP-NET

NO.12 You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its
application development platform. You have recently finished development of an ASP.NET Web
application using the .NET Framework 3.5. You host the application on a Web farm that consists of three
Web servers. You should configure the ASP.NET application for session state to meet the following
requirements:
l Session state data should not be lost if a server fails.
l Session state must be maintained across browser requests by the same user.
You are required to configure the Web.config file to meet these requirements. Which of the following
configurations will you use?
A. <sessionState mode="StateServer"/>
B. <sessionState mode="InProc"/>
C. <sessionState mode="Custom"/>
D. <sessionState mode="SQLServer"/>
Answer: D

GIAC   GSSP-NET   certification GSSP-NET   GSSP-NET

NO.13 Session variables can be any valid __________.
A. .NET Framework type
B. Integer type
C. SessionStateItemCollection object
D. Object type
Answer: A

GIAC   GSSP-NET examen   certification GSSP-NET   GSSP-NET

NO.14 You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its
application development platform. You have recently created an application that includes the code shown
below.
string str1 = "ABC";
string str2 = "u";
str2 += "Certify";
Console.WriteLine(str1 == str2);
Console.WriteLine((Object) str1 == (Object) str2);
Console.WriteLine(str1.Equals(str2));
What will be the output of the above code?
A. False False False
B. False True False
C. True True True
D. True False True
Answer: D

GIAC examen   certification GSSP-NET   GSSP-NET examen   GSSP-NET examen   GSSP-NET examen   certification GSSP-NET

NO.15 Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server
that hosts the company's Web site. Andrew wants to enhance the security of the Web site by
implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
A. Symmetric
B. Secret
C. IPSec
D. Asymmetric
Answer: A,D

certification GIAC   certification GSSP-NET   GSSP-NET   certification GSSP-NET   certification GSSP-NET

NO.16 You work as a Software Developer for Mansoft Inc. You create an application and use it to create code
access security policies. Which of the following tools will you use to examine and modify code access
security policies from a batch file?
A. Tlbimp.exe
B. GacUtil.exe
C. Sn.exe
D. Caspol.exe
E. StoreAdm.exe
Answer: D

GIAC examen   GSSP-NET   GSSP-NET examen

NO.17 Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its
application development platform. He creates an application using .NET Framework. He wants to encrypt
all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
A. PPP
B. FTP
C. PPTP
D. PGP
Answer: D

GIAC   GSSP-NET   GSSP-NET examen   GSSP-NET   GSSP-NET

NO.18 You work as a Software Developer for ABC Inc. The company has several branches worldwide. The
company uses Visual Studio .NET 2005 as its application development platform. You are creating an
application using .NET Framework 2.0. The application will be used by all the branches of the company.
You are using the CompareInfo class for culture-sensitive string comparisons. You write the following
code in the application:
String s1 = "C rtify";
String s2 = "c rtify";
String s3 = "c rtify";
You need to compare the s1 string with the s2 string and ensure that the string comparison must ignore
case. Which of the following code segments will you use to accomplish the task?
A. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.IgnoreCase));
B. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.None));
C. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.Ordinal));
D. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1,
s2, CompareOptions.OrdinalIgnoreCase));
Answer: A

GIAC examen   certification GSSP-NET   certification GSSP-NET

NO.19 Which of the following session and instancing modes will you set if you require a sessionfull binding
and want to create a new instance object for each client request?
A. Set SessionMode to Allowed and IntsanceMode to PerSession.
B. Set SessionMode to Required and IntsanceMode to Single.
C. Set SessionMode to Required and IntsanceMode to PerCall.
D. Set SessionMode to Allowed and IntsanceMode to PerCall.
Answer: C

GIAC   GSSP-NET   certification GSSP-NET   GSSP-NET examen

NO.20 You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its
application development platform. You have recently finished development of a Windows application
using .NET Framework. Users report that the application is not running properly. When the users try to
complete a particular action, the following error message comes out:
Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,
PublicKeyToken=29b5ad26c9de9b95'.
You notice that the error occurs as soon as the application tries to call functionality in a serviced
component that was registered by using the following command:
regsvcs.exe myservices.dll
You must make sure that the application can call the functionality in the serviced component with no
exceptions being thrown. What will you do to accomplish this task?
A. Run the command line tool: regasm.exe myservices.dll.
B. Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.
C. Run the command line tool: gacutil.exe /i myservices.dll.
D. Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.
Answer: C

GIAC   GSSP-NET   certification GSSP-NET   GSSP-NET examen

Pass4Test est un site d'offrir l'outil de formation convenable pour les candidats de test Certification IT. Le produit de Pass4Test peut aider les candidats à économiser les temps et les efforts. L'outil de formation est bien proche que test réel. Vous allez réussir le test 100% avec l'aide de test simulation de Pass4Test. C'est une bonne affaire à prendre le Certificat IT en coûtant un peu d'argent. N'hésitez plus d'ajouter l'outil de formation au panier.