ITCertKing GIAC GPEN exam questions are made in accordance with the latest syllabus and the actual GIAC GPEN certification exam. We constantly upgrade our training materials, all the products you get with one year of free updates. You can always extend the to update subscription time, so that you will get more time to fully prepare for the exam. If you still confused to use the training materials of ITCertKing, then you can download part of the examination questions and answers in ITCertKing website. It is free to try, and if it is suitable for you, then go to buy it, to ensure that you will never regret.
IT certification exam is very popular examination in the current society, especially in the IT industry. IT certification test qualification is widely recognized by the international community. Promotion, salary raise and improving your job skills, IT certification exam is your best choice. I believe that you must think so. Then, don't hesitate to take GIAC GPEN exam which is the most popular test in the recent. If you have no idea how to prepare the certification materials for the exam, ITCertKing serve you. ITCertKing can provide you with everything you need.
Have you thought of how to easily pass GIAC GPEN test? Have you found the trick? If you don't know what to do, I'll help you. In actual, there are many methods to sail through GPEN exam. One is to learn exam related knowledge GPEN certification test demands. Are you doing like this?However the above method is the worst time-waster and you cannot get the desired effect. Busying at work, you might have not too much time on preparing for GPEN certification test. Try ITCertKing GIAC GPEN exam dumps. ITCertKing dumps can absolutely let you get an unexpected effect.
Exam Code: GPEN
Exam Name: GIAC (GIAC Certified Penetration Tester)
One year free update, No help, Full refund!
Total Q&A: 384 Questions and Answers
Last Update: 2013-12-27
To pass the GIAC GPEN exam is a dream who are engaged in IT industry. If you want to change the dream into reality, you only need to choose the professional training. ITCertKing is a professional website that providing IT certification training materials. Select ITCertKing, it will ensure your success. No matter how high your pursuit of the goal, ITCertKing will make your dreams become a reality.
GPEN Free Demo Download: http://www.itcertking.com/GPEN_exam.html
NO.1 Which of the following tools is used to verify the network structure packets and confirm that
the packets are constructed according to specification?
A. EtherApe
B. Snort decoder
C. AirSnort
D. snort_inline
Answer: B
GIAC GPEN GPEN exam
NO.2 Which of the following statements are true about WPA?
Each correct answer represents a complete solution. Choose all that apply.
A. WPA-PSK converts the passphrase into a 256-bit key.
B. WPA provides better security than WEP .
C. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireles s client.
D. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.
Answer: A,B,C,D
GIAC exam prep GPEN exam GPEN original questions GPEN
NO.3 Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
A. FindSA
B. SQLDict
C. nmap
D. SQLBF
Answer: A,B,D
GIAC braindump GPEN GPEN GPEN pdf
NO.4 You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an
unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by
your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after
noticing the following string in the log file:
(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)
When you find All your 802.11b are belong to us as the payload string, you are convinced about
which tool is being used for the unauthorized access. Which of the following tools have you
ascertained?
A. AirSnort
B. Kismet
C. AiroPeek
D. NetStumbler
Answer: D
GIAC GPEN test answers GPEN test questions GPEN demo GPEN certification GPEN exam dumps
NO.5 A Web developer with your company wants to have wireless access for contractors that come
in to work on various projects. The process of getting this approved takes time. So rather than wait,
he has put his own wireless router attached to one of the network ports in his department. What
security risk does this present?
A. An unauthorized WAP is one way for hackers to get into a network.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. None, adding a wireless access point is a common task and not a security risk.
Answer: A
GIAC exam prep GPEN certification GPEN GPEN exam prep GPEN GPEN original questions
NO.6 Which of the following are the scanning methods used in penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
A. Vulnerability
B. Port
C. Network
D. Services
Answer: A,B,C
GIAC GPEN GPEN questions GPEN GPEN
NO.7 You have inserted a Trojan on your friend's computer and you want to put it in the startup so
that whenever the computer reboots the Trojan will start to run on the startup. Which of the
following registry entries will you edit to accomplish the task?
A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start
B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Answer: D
GIAC GPEN GPEN pdf
NO.8 John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the
local disk and obtains all the files on the Web site. Which of the following techniques is he using to
accomplish his task?
A. TCP FTP proxy scanning
B. Eavesdropping
C. Web ripping
D. Fingerprinting
Answer: C
GIAC GPEN original questions GPEN study guide GPEN GPEN
NO.9 TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to
the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the
attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored
and the port will drop the packet. Which of the following operating systems can be easily identified
with the help of TCP FIN scanning?
A. Solaris
B. Red Hat
C. Windows
D. Knoppix
Answer: C
GIAC GPEN exam simulations GPEN dumps
NO.10 You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
A. Capture data on port 53 and performing banner grabbing.
B. Listen the incoming traffic on port 53 and execute the remote shell.
C. Listen the incoming data and performing port scanning.
D. Capture data on port 53 and delete the remote shell.
Answer: B
GIAC GPEN dumps GPEN
NO.11 Which of the following statements is true about the Digest Authentication scheme?
A. In this authentication scheme, the username and password are passed with every request, not
just when the user first types them.
B. A valid response from the client contains a checksum of the username, the password, the given
random value, the HTTP method, and the requested URL.
C. The password is sent over the network in clear text format.
D. It uses the base64 encoding encryption scheme.
Answer: B
GIAC GPEN exam simulations GPEN dumps GPEN
NO.12 Which of the following statements are true about KisMAC?
A. Data generated by KisMAC can also be saved in pcap format.
B. It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.
C. It scans for networks passively on supported cards.
D. It is a wireless network discovery tool for Mac OS X.
Answer: A,C,D
GIAC practice test GPEN GPEN answers real questions GPEN test
NO.13 You work as a professional Ethical Hacker. You are assigned a project to perform blackhat
testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition
mechanic. You claim that someone from the office called you saying that there is some fault in the
air-conditioner of the server room. After some inquiries/arguments, the Security Administrator
allows you to repair the air-conditioner of the server room.
When you get into the room, you found the server is Linux-based. You press the reboot button of
the server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly
boots backup into Knoppix. You mount the root partition of the server after replacing the root
password in the /etc/shadow file with a known password hash and salt. Further, you copy the netcat
tool on the server and install its startup files to create a reverse tunnel and move a shell to a remote
server whenever the server is restarted. You simply restart the server, pull out the Knoppix Live CD
from the server, and inform that the air-conditioner is working properly.
After completing this attack process, you create a security auditing report in which you mention
various threats such as social engineering threat, boot from Live CD, etc. and suggest the
countermeasures to stop booting from the external media and retrieving sensitive data. Which of
the following steps have you suggested to stop booting from the external media and retrieving
sensitive data with regard to the above scenario?
Each correct answer represents a complete solution. Choose two.
A. Encrypting disk partitions
B. Using password protected hard drives
C. Placing BIOS password
D. Setting only the root level access for sensitive data
Answer: A,B
GIAC test questions GPEN test questions GPEN GPEN
NO.14 Which of the following is NOT an example of passive footprinting?
A. Scanning ports.
B. Analyzing job requirements.
C. Performing the whois query.
D. Querying the search engine.
Answer: A
GIAC GPEN exam dumps GPEN GPEN certification training GPEN certification training GPEN certification training
NO.15 Which of the following encryption modes are possible in WEP?
Each correct answer represents a complete solution. Choose all that apply.
A. No encryption
B. 256 bit encryption
C. 128 bit encryption
D. 40 bit encryption
Answer: A,C,D
GIAC GPEN GPEN dumps GPEN GPEN test answers
NO.16 Which of the following statements are true about SSIDs?
Each correct answer represents a complete solution. Choose all that apply.
A. SSIDs are case insensitive text strings and have a maximum length of 64 characters.
B. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks
will create a conflict.
C. SSID is used to identify a wireless network.
D. All wireless devices on a wireless network must have the same SSID in order to communicate
with each other.
Answer: B,C,D
GIAC GPEN exam GPEN GPEN
NO.17 Which of the following attacks allows an attacker to sniff data frames on a local area network
(LAN) or stop the traffic altogether?
A. Man-in-the-middle
B. ARP spoofing
C. Port scanning
D. Session hijacking
Answer: B
GIAC GPEN GPEN
NO.18 Which of the following options holds the strongest password?
A. california
B. $#164aviD
没有评论:
发表评论