Master the GPEN GIAC Certified Penetration Tester content and be ready for exam day success quickly with this Certleader GPEN exam answers. We guarantee it!We make it a reality and give you real GPEN questions in our GIAC GPEN braindumps.Latest 100% VALID GIAC GPEN Exam Questions Dumps at below page. You can use our GIAC GPEN braindumps and pass your exam.
GIAC GPEN Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
Which of the following techniques are NOT used to perform active OS fingerprinting?
Each correct answer represents a complete solution. Choose all that apply.
- A. ICMP error message quoting
- B. Analyzing email headers
- C. Sniffing and analyzing packets
- D. Sending FIN packets to open ports on the remote system
Answer: BC
NEW QUESTION 2
__________ firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network.
- A. packet filtering
- B. Screened host
- C. Dual homed host
- D. Screened subnet
Answer: B
NEW QUESTION 3
Which of the following IEEE standards defines Wired Equivalent Privacy encryption scheme?
- A. 802.15
- B. 802.11b
- C. 802.11a
- D. 802.11g
Answer: B
NEW QUESTION 4
Which of the following attacks can be overcome by applying cryptography?
- A. Web ripping
- B. Sniffing
- C. DoS
- D. Buffer overflow
Answer: B
NEW QUESTION 5
If the privacy bit is set in the 802.11 header, what does it indicate?
- A. SSID cloaking is being use
- B. Some form of encryption is In us
- C. WAP is being use
- D. Some form of PEAP is being use
Answer: C
NEW QUESTION 6
Why is it important to have a cheat sheet reference of database system tables when performing SQL Injection?
- A. This is where sites typically store sensitive information such as credit card number
- B. These tables contain a list of allowed database applications
- C. The information in these tables will reveal details about the web application's cod
- D. These tables contain metadata that can be queried to gain additional helpful informatio
Answer: D
Explanation:
Reference: http://www.rackspace.com/knowledge_center/article/sql-injection-in-mysql
NEW QUESTION 7
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
- A. Ettercap
- B. Nmap
- C. Netcraft
- D. Ethereal
Answer: C
NEW QUESTION 8
Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?
- A. HTTPS
- B. SSL
- C. LDAP
- D. TLS
Answer: A
Explanation:
Reference:
http://nmap.org/book/vscan.html
NEW QUESTION 9
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
It is commonly used for the following purposes:
:a. War driving
:b. Detecting unauthorized access points
:c. Detecting causes of interference on a WLAN
:d. WEP ICV error tracking
:e. Making Graphs and Alarms on 802.11 Data, including Signal Strength
This tool is known as __________.
- A. Absinthe
- B. THC-Scan
- C. NetStumbler
- D. Kismet
Answer: C
NEW QUESTION 10
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
- A. Cross site scripting attack
- B. SQL injection attack
- C. Bluesnarfing
- D. Bluebug attack
- E. Social engineering
Answer: CD
NEW QUESTION 11
A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester attempting to accomplish using the following Nmap command?
- A. Checking operating system version
- B. Running an exploit against the target
- C. Checking configuration
- D. Checking protocol version
Answer: D
NEW QUESTION 12
Analyze the output of the two commands below:
Which of the following can be factually inferred from the results of these commands?
- A. The router 192.16S.U6.1 is filtering UDP tracerout
- B. The host 10.63.104.1 is silently dropping UDP packet
- C. The host 10.63.104.1 is not issuing ICMP packet
- D. The router 10 63.104 206 is dropping ICMP tracerout
Answer: C
NEW QUESTION 13
Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?
- A. Whishker
- B. Nmap
- C. Nessus
- D. SARA
Answer: C
NEW QUESTION 14
When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
- A. Closed
- B. Open
- C. Filtered
Answer: B
NEW QUESTION 15
John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.
Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:
<script>alert('Hi, John')</script>
After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."
Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?
- A. Replay attack
- B. Buffer overflow attack
- C. CSRF attack
- D. XSS attack
Answer: D
NEW QUESTION 16
Which of the following nmap switches is used to perform ICMP netmask scanning?
- A. -PM
- B. -PB
- C. -PI
- D. -PS
Answer: A
NEW QUESTION 17
Analyze the screenshot below, which of the following sets of results will be retrieved using this search?
- A. Pages from the domain sans.edu that have external link
- B. Files of type .php from the domain sans.ed
- C. Pages that contain the term ext:php and slte.sans.ed
- D. Files of type .php that redirect to the sans.edu domai
Answer: A
NEW QUESTION 18
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
l Gathering information
l Determining the network range
l Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
- A. APNIC
- B. SuperScan
- C. RIPE
- D. ARIN
Answer: B
NEW QUESTION 19
......
P.S. Surepassexam now are offering 100% pass ensure GPEN dumps! All GPEN exam questions have been updated with correct answers: https://www.surepassexam.com/GPEN-exam-dumps.html (385 New Questions)