Want to know Certleader GPEN Exam practice test features? Want to lear more about GIAC GIAC Certified Penetration Tester certification experience? Study Breathing GIAC GPEN answers to Renew GPEN questions at Certleader. Gat a success with an absolute guarantee to pass GIAC GPEN (GIAC Certified Penetration Tester) test on your first attempt.
Check GPEN free dumps before getting the full version:
NEW QUESTION 1
In which layer of the OSI model does a sniffer operate?
- A. Network layer
- B. Session layer
- C. Presentation layer
- D. Data link layer
Answer: D
NEW QUESTION 2
CORRECT TEXT
Fill in the blank with the appropriate tool name.
__________is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.
- A.
Answer: WEPcrack
NEW QUESTION 3
You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.
- A. Port scanning
- B. Spoofing
- C. Cloaking
- D. Firewalking
Answer: D
NEW QUESTION 4
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-aresecure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
- A. The site should use CAPTCHA after a specific number of failed login attempt
- B. The site should restrict the number of login attempts to only three time
- C. The site should force its users to change their passwords from time to tim
- D. The site should increase the encryption key length of the passwor
Answer: AB
NEW QUESTION 5
Which of the following tasks is NOT performed by antiviruses?
- A. Activity blocking
- B. Heuristic scanning
- C. Integrity scanning
- D. Session hijacking
Answer: D
NEW QUESTION 6
What will the following scapy commands do?
- A. Perform a SYN-ACK scan against TCP ports 80 and 3080 on host 192.168.1.24.
- B. Perform a SYN scan against ports 80 through 8080 for all hosts on the192.168.1.0/24 networ
- C. Combine the answered and unanswered results of a previous scan into the sr(packet)variabl
- D. Perform a SYN-ACK scan against TCP ports 80 and 8080 for all hosts on the192.16S.1.0/24 networ
Answer: D
NEW QUESTION 7
LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.
- A. 0xAAD3B435B51404EE
- B. 0xBBD3B435B51504FF
- C. 0xBBC3C435C51504EF
- D. 0xAAD3B435B51404FF
Answer: A
NEW QUESTION 8
You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
- A. Capture data on port 53 and performing banner grabbin
- B. Capture data on port 53 and delete the remote shel
- C. Listen the incoming traffic on port 53 and execute the remote shel
- D. Listen the incoming data and performing port scannin
Answer: C
NEW QUESTION 9
You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?
- A. Nmap
- B. Sam spade
- C. Whois
- D. Google
Answer: D
NEW QUESTION 10
A tester has been contracted to perform a penetration test for a corporate client. The scope of the test is limited to end-user workstations and client programs only. Which of die following actions is allowed in this test?
- A. Attempting to redirect the internal gateway through ARP poisoning
- B. Activating bot clients and performing a denial-of-service against the gatewa
- C. Sniffing and attempting to crack the Domain Administrators password has
- D. Sending a malicious pdf to a user and exploiting a vulnerable Reader versio
Answer: B
NEW QUESTION 11
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?
- A. The laptop will be able to access the wireless network but the security will be compromised
- B. The WAP will allow the connection with the guest account's privilege
- C. The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with i
- D. The laptop will not be able to access the wireless networ
Answer: D
NEW QUESTION 12
You are pen testing a Windows system remotely via a raw netcat shell. You want to get a listing of all the local users in the administrators group, what command would you use?
- A. Net account administrators
- B. Net user administrators
- C. Net localgroup administrators
- D. Net localuser administrators
Answer: C
NEW QUESTION 13
Which of the following is NOT a valid DNS zone type?
- A. Stub zone
- B. Secondary zone
- C. AlterNet zone
- D. Primary zone
Answer: C
NEW QUESTION 14
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-aresecure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
- A. The site should increase the encryption key length of the passwor
- B. The site should restrict the number of login attempts to only three time
- C. The site should force its users to change their passwords from time to tim
- D. The site should use CAPTCHA after a specific number of failed login attempt
Answer: BD
NEW QUESTION 15
Which of the following tools can be used to automate the MITM attack?
- A. Hotspotter
- B. Airjack
- C. Kismet
- D. IKECrack
Answer: B
NEW QUESTION 16
What difference would you expect to result from running the following commands;
(I). S dig .ns domain.com target.com -t AXFR
and
(2). S dig .ns.domain.com target.com -t IXFR=1002200301
- A. Command (I) will display incremental information about a domain and command (2) Will provide only 1002200301 bytes of information
- B. Command (1) will display all information about a domain and command (2) willprovide only incremental updates from SOA 1002200301
- C. Command (I) will display all information about a domain and command (2) willprovide only incremental updates up to SOA 1002200301
- D. Command (I) will display all information about a domain and command (2) willprovide only 1002200301 bytes of information
Answer: B
NEW QUESTION 17
What is the impact on pre-calculated Rainbow Tables of adding multiple salts to a set of passwords?
- A. Salts increases the time to crack the original password by increasing the number oftables that must be calculate
- B. Salts double the total size of a rainbow table databas
- C. Salts can be reversed or removed from encoding quickly to produce unsaltedhashe
- D. Salts have little effect because they can be calculated on the fly with applicationssuch as Ophcrac
Answer: B
NEW QUESTION 18
CORRECT TEXT
Fill in the blank with the appropriate tool.
____scans IP networks for NetBIOS name information and works in the same manner as nbtstat, but it operates on a range of addresses instead of just one.
- A.
Answer: NBTscan
NEW QUESTION 19
......
Recommend!! Get the Full GPEN dumps in VCE and PDF From Certshared, Welcome to Download: https://www.certshared.com/exam/GPEN/ (New 385 Q&As Version)