Free GSNA Exam Dumps

Question 16

- (Topic 3)
Samantha works as a Web Developer for XYZ CORP. She develops a Web application using Visual InterDev. She wants to group a series of HTML elements together so that an action can be performed collectively on them. Which of the following tags will Samantha use to accomplish this?

Correct Answer:A

DIV is an HTML tag that groups a series of elements into a larger group. It can be used when an action needs to be performed collectively on the grouped elements. The DIV tag acts as a container for other elements. Answer D is incorrect. The SPAN tag is used within an element to group a part of it. For example, this tag can be used to group a few sentences from within a paragraph, so that a particular action can be performed only on them. Answer C is incorrect. The BODY tag is used to specify the beginning and end of
the document body. Answer B is incorrect. There is no tag such as GROUP in HTML.

Question 17

- (Topic 2)
You work as a Network Administrator for XYZ CORP. The company has a small TCP/IP- based network environment. The network contains a Cisco Catalyst 6000 family switch. A few sales people come to your outer office and use your local network to access the Internet, as well as to demonstrate their products. What will you do to prevent your network from being accessed by any outside computers?

Correct Answer:A
According to the question, you are required to prevent outside computers from accessing your network. You should therefore configure the switch's port access based on the MAC address, which can be done by configuring port security. Port security is a feature of Cisco Catalyst series switches. Port security is used to block input based on the media access control (MAC) address to an Ethernet, Fast Ethernet, or Gigabit Ethernet port. It denies the port access to a workstation when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Internet or other outside networks. Answer D is incorrect. A port scanner is a software tool that is designed to search a network host for open ports. This tool is often used by administrators to check the security of their networks. It is also used by hackers to compromise the network and systems.

Question 18

- (Topic 1)
Which of the following encryption encoding techniques is used in the basic authentication method?

Correct Answer:D

Base64 encryption encoding, which can easily be decoded, is used in the basic authentication method. Answer B is incorrect. The Md5 hashing technique is used in the digest authentication method. Answer A is incorrect. The HMAC_MD5 hashing technique is used in the NTLMv2 authentication method. Answer C is incorrect. DES (ECB mode) is used in the NTLMv1 authentication method.

Question 19

- (Topic 2)
You work as the Network Technician for XYZ CORP. The company has a Linux-based network. You are working on the Red Hat operating system. You want to view only the last 4 lines of a file named /var/log/cron. Which of the following commands should you use to accomplish the task?

Correct Answer:A

The tail -n 4 /var/log/cron command will show the last four lines of the file /var/log/cron.

Question 20

- (Topic 4)
Which of the following is a method of the HttpSession interface and is used to retrieve the time when the session was created?

Correct Answer:A

The getCreationTime() method returns the time when the session was created. The time is measured in milliseconds since midnight January 1, 1970. This method throws an IllegalStateException if it is called on an invalidated session.