Master the GPEN GIAC Certified Penetration Tester content and be ready for exam day success quickly with this Certleader GPEN exam answers. We guarantee it!We make it a reality and give you real GPEN questions in our GIAC GPEN braindumps.Latest 100% VALID GIAC GPEN Exam Questions Dumps at below page. You can use our GIAC GPEN braindumps and pass your exam.

GIAC GPEN Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

Which of the following techniques are NOT used to perform active OS fingerprinting?
Each correct answer represents a complete solution. Choose all that apply.

  • A. ICMP error message quoting
  • B. Analyzing email headers
  • C. Sniffing and analyzing packets
  • D. Sending FIN packets to open ports on the remote system

Answer: BC

NEW QUESTION 2

__________ firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network.

  • A. packet filtering
  • B. Screened host
  • C. Dual homed host
  • D. Screened subnet

Answer: B

NEW QUESTION 3

Which of the following IEEE standards defines Wired Equivalent Privacy encryption scheme?

  • A. 802.15
  • B. 802.11b
  • C. 802.11a
  • D. 802.11g

Answer: B

NEW QUESTION 4

Which of the following attacks can be overcome by applying cryptography?

  • A. Web ripping
  • B. Sniffing
  • C. DoS
  • D. Buffer overflow

Answer: B

NEW QUESTION 5

If the privacy bit is set in the 802.11 header, what does it indicate?

  • A. SSID cloaking is being use
  • B. Some form of encryption is In us
  • C. WAP is being use
  • D. Some form of PEAP is being use

Answer: C

NEW QUESTION 6

Why is it important to have a cheat sheet reference of database system tables when performing SQL Injection?

  • A. This is where sites typically store sensitive information such as credit card number
  • B. These tables contain a list of allowed database applications
  • C. The information in these tables will reveal details about the web application's cod
  • D. These tables contain metadata that can be queried to gain additional helpful informatio

Answer: D

Explanation:
Reference: http://www.rackspace.com/knowledge_center/article/sql-injection-in-mysql

NEW QUESTION 7

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

  • A. Ettercap
  • B. Nmap
  • C. Netcraft
  • D. Ethereal

Answer: C

NEW QUESTION 8

Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?

  • A. HTTPS
  • B. SSL
  • C. LDAP
  • D. TLS

Answer: A

Explanation:
Reference:
http://nmap.org/book/vscan.html

NEW QUESTION 9

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
It is commonly used for the following purposes:
:a. War driving
:b. Detecting unauthorized access points
:c. Detecting causes of interference on a WLAN
:d. WEP ICV error tracking
:e. Making Graphs and Alarms on 802.11 Data, including Signal Strength
This tool is known as __________.

  • A. Absinthe
  • B. THC-Scan
  • C. NetStumbler
  • D. Kismet

Answer: C

NEW QUESTION 10

Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.

  • A. Cross site scripting attack
  • B. SQL injection attack
  • C. Bluesnarfing
  • D. Bluebug attack
  • E. Social engineering

Answer: CD

NEW QUESTION 11

A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester attempting to accomplish using the following Nmap command?
GPEN dumps exhibit

  • A. Checking operating system version
  • B. Running an exploit against the target
  • C. Checking configuration
  • D. Checking protocol version

Answer: D

NEW QUESTION 12

Analyze the output of the two commands below:
GPEN dumps exhibit
Which of the following can be factually inferred from the results of these commands?

  • A. The router 192.16S.U6.1 is filtering UDP tracerout
  • B. The host 10.63.104.1 is silently dropping UDP packet
  • C. The host 10.63.104.1 is not issuing ICMP packet
  • D. The router 10 63.104 206 is dropping ICMP tracerout

Answer: C

NEW QUESTION 13

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?

  • A. Whishker
  • B. Nmap
  • C. Nessus
  • D. SARA

Answer: C

NEW QUESTION 14

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

  • A. Closed
  • B. Open
  • C. Filtered

Answer: B

NEW QUESTION 15

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.
Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:
<script>alert('Hi, John')</script>
After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."
Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

  • A. Replay attack
  • B. Buffer overflow attack
  • C. CSRF attack
  • D. XSS attack

Answer: D

NEW QUESTION 16

Which of the following nmap switches is used to perform ICMP netmask scanning?

  • A. -PM
  • B. -PB
  • C. -PI
  • D. -PS

Answer: A

NEW QUESTION 17

Analyze the screenshot below, which of the following sets of results will be retrieved using this search?
GPEN dumps exhibit

  • A. Pages from the domain sans.edu that have external link
  • B. Files of type .php from the domain sans.ed
  • C. Pages that contain the term ext:php and slte.sans.ed
  • D. Files of type .php that redirect to the sans.edu domai

Answer: A

NEW QUESTION 18

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
l Gathering information
l Determining the network range
l Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

  • A. APNIC
  • B. SuperScan
  • C. RIPE
  • D. ARIN

Answer: B

NEW QUESTION 19
......

P.S. Surepassexam now are offering 100% pass ensure GPEN dumps! All GPEN exam questions have been updated with correct answers: https://www.surepassexam.com/GPEN-exam-dumps.html (385 New Questions)