New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GPEN GIAC Penetration Tester Questions and Answers

Questions 4

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:

A.

FTK Imager

B.

FAU

C.

Device Seizure

D.

Galleta

Buy Now
Questions 5

GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which of the following cryptographic attacks can be used to break both ciphers?

Options:

A.

Man-in-the-middle attack

B.

Ciphertext only attack

C.

Known plaintext attack

D.

Replay attack

Buy Now
Questions 6

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Options:

A.

Collecting employees information

B.

Gathering private and public IP addresses

C.

Performing Neotracerouting

D.

Banner grabbing

Buy Now
Questions 7

Which of the following techniques are NOT used to perform active OS fingerprinting?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Analyzing email headers

B.

Sniffing and analyzing packets

C.

ICMP error message quoting

D.

Sending FIN packets to open ports on the remote system

Buy Now
Questions 8

Which of the following tools can be used to automate the MITM attack?

Options:

A.

Hotspotter

B.

Airjack

C.

Kismet

D.

IKECrack

Buy Now
Questions 9

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

IP spoofing

B.

Mac flooding

C.

Man-in-the-middle

D.

DNS poisoning

Buy Now
Questions 10

You work as an IT Technician for uCertify Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

Options:

A.

MAC Filtering

B.

SSID

C.

RAS

D.

WEP

Buy Now
Questions 11

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Close port TCP 53.

B.

Change the default community string names.

C.

Upgrade SNMP Version 1 with the latest version.

D.

Install antivirus.

Buy Now
Questions 12

You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?

Options:

A.

Nmap

B.

Sam spade

C.

Whois

D.

Google

Buy Now
Questions 13

Which of the following commands can be used for port scanning?

Options:

A.

nc -z

B.

nc -t

C.

nc -w

D.

nc –g

Buy Now
Questions 14

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

ntop

B.

Brutus

C.

nmap

D.

sniffer

Buy Now
Questions 15

You work as an IT Technician for uCertify Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

Options:

A.

MAC Filtering

B.

SSID

C.

RAS

D.

WEP

Buy Now
Questions 16

How can a non-privileged user on a Unix system determine if shadow passwords are being used?

Options:

A.

Read /etc/password and look for "x" or “II” in the second colon-delimited field

B.

Read /etc/shadow and look for “x” or “II” in the second colon-delimited field

C.

Verify that /etc/password has been replaced with /etc/shadow

D.

Read /etc/shadow and look NULL values In the second comma delimited field

Buy Now
Questions 17

You are done pen testing a Windows system and need to clean up some of the changes you have made. You created an account ‘pentester’ on the system, what command would you use to delete that account?

Options:

A.

Net user pentester /del

B.

Net name pentester /del

C.

Net localuser pentester /del

D.

Net account pentester /del

Buy Now
Questions 18

Approximately how many packets are usually required to conduct a successful FMS attack onWEP?

Options:

A.

250.000

B.

20.000

C.

10.000,000

D.

l (with a weak IV)

Buy Now
Questions 19

Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?

Options:

A.

One-way, the client challenges the access point

B.

One-way, the access point challenges the client

C.

No challenges occur (or wireless connection

D.

Two-way, both the client and the access point challenge each other

Buy Now
Questions 20

You've been contracted by the owner of a secure facility to try and break into their office in the middle of the night. Your client requested photographs of any sensitive information found as proof of your accomplishments. The job you've been hired to perform is an example of what practice?

Options:

A.

Penetration Testing

B.

Ethical Hacking

C.

Vulnerability Assessing

D.

Security Auditing

Buy Now
Questions 21

What is the MOST important document to obtain before beginning any penetration testing?

Options:

A.

Project plan

B.

Exceptions document

C.

Project contact list

D.

A written statement of permission

Buy Now
Questions 22

Which of the following file transfer programs will automatically convert end-of line characters between different platforms when placed in ASCII Mode?

Options:

A.

ftp

B.

nc

C.

tftp

D.

scp

Buy Now
Questions 23

Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Privacy (WEP) effectively provides?

Options:

A.

64

B.

40

C.

60

D.

44

Buy Now
Questions 24

Analyze the command output below, what action is being performed by the tester?

Options:

A.

Displaying a Windows SAM database

B.

Listing available workgroup services

C.

Discovering valid user accounts

D.

Querying locked out user accounts

Buy Now
Questions 25

Which Metasploit payload includes simple upload and download functionality for moving files to and from compromised systems?

Options:

A.

DLL inject

B.

Upexec

C.

Meterpreter

D.

Vncinject

Buy Now
Questions 26

Analyze the command output below. What action is being performed by the tester?

Options:

A.

Creating user accounts on 10.0.1.4 and testing privileges

B.

Collecting password hashes for users on 10.0.1.4

C.

Attempting to exploit windows File and Print Sharing service

D.

Gathering Security identifiers for accounts on 10.0.1.4

Buy Now
Questions 27

You have been contracted to map me network and try to compromise the servers for a client. Which of the following would be an example of scope creep' with respect to this penetration testing project?

Options:

A.

Disclosing information forbidden in the NDA

B.

Compromising a server then escalating privileges

C.

Being asked to compromise workstations

D.

Scanning network systems slowly so you are not detected

Buy Now
Questions 28

A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?

Options:

A.

Use the http service's PUT command to push the file onto the target machine.

B.

Use the scp service, protocol SSHv2 to pull the file onto the target machine.

C.

Use the telnet service's ECHO option to pull the file onto the target machine

D.

Use the ftp service in passive mode to push the file onto the target machine.

Buy Now
Questions 29

Which of the following best describes a client side exploit?

Options:

A.

Attack of a client application that retrieves content from the network

B.

Attack that escalates user privileged to root or administrator

C.

Attack of a service listening on a client system

D.

Attack on the physical machine

Buy Now
Questions 30

Analyze the screenshot below. What type of vulnerability is being attacked?

Options:

A.

Windows Server service

B.

Internet Explorer

C.

Windows Powershell

D.

Local Security Authority

Buy Now
Questions 31

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

Options:

A.

Post-attack phase

B.

Attack phase

C.

Pre-attack phase

D.

On-attack phase

Buy Now
Questions 32

Which of the following is a passive information gathering tool?

Options:

A.

Whois

B.

Snort

C.

Ettercap

D.

Nmap

Buy Now
Questions 33

Which of the following tools is spyware that makes Windows clients send their passwords as clear text?

Options:

A.

Pwddump2

B.

SMBRelay

C.

KrbCrack

D.

C2MYAZZ

Buy Now
Questions 34

Which of the following tools is used to verify the network structure packets and confirm that the packets are constructed according to specification?

Options:

A.

snort_inline

B.

EtherApe

C.

Snort decoder

D.

AirSnort

Buy Now
Questions 35

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:

A.

Performs the XSS attacks.

B.

Deletes the entire members table.

C.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

D.

Deletes the database in which members table resides.

Buy Now
Questions 36

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MAC filtering the router

B.

Using WPA encryption

C.

Using WEP encryption

D.

Not broadcasting SSID

Buy Now
Questions 37

You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?

Options:

A.

Cain and Abel

B.

Brutus

C.

Dsniff

D.

Nmap

Buy Now
Questions 38

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:

A.

NTLM authentication

B.

Microsoft Passport authentication

C.

Basic authentication

D.

Digest authentication

Buy Now
Questions 39

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

Options:

A.

The we-are-secure.com server is using honeypot.

B.

The we-are-secure.com server is using a TCP wrapper.

C.

The telnet service of we-are-secure.com has corrupted.

D.

The telnet session is being affected by the stateful inspection firewall.

Buy Now
Questions 40

Write the appropriate attack name to fill in the blank.

In a _____________ DoS attack, the attacker sends a spoofed TCP SYN packet in which the IP address of the target is filled in both the source and destination fields.

Options:

Buy Now
Questions 41

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Cross-Site Scripting attack

C.

Cross-Site Request Forgery

D.

Code injection attack

Buy Now
Questions 42

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WPA2 -EAP

B.

WPA-PSK

C.

WPA-EAP

D.

WEP

Buy Now
Questions 43

Fill in the blank with the appropriate tool.

____scans IP networks for NetBIOS name information and works in the same manner as nbtstat, but it operates on a range of addresses instead of just one.

Options:

Buy Now
Questions 44

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WEP

B.

Implement MAC filtering

C.

Don't broadcast SSID

D.

Implement WPA

Buy Now
Questions 45

Which of the following tools can be used to perform Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

Cain

B.

L0phtcrack

C.

Pass-the-hash toolkit

D.

John the Ripper

Buy Now
Questions 46

Which of the following is a web ripping tool?

Options:

A.

Netcat

B.

NetBus

C.

SuperScan

D.

Black Widow

Buy Now
Questions 47

You want to perform an active session hijack against Secure Inc. You have found a target that allows Telnet session. You have also searched an active session due to the high level of traffic on the network. What should you do next?

Options:

A.

Use a sniffer to listen network traffic.

B.

Guess the sequence numbers.

C.

Use brutus to crack telnet password.

D.

Use macoff to change MAC address.

Buy Now
Questions 48

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

Options:

A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size

Buy Now
Questions 49

In which of the following attacks does the attacker overload the CAM table of the switch?

Options:

A.

Mac flooding

B.

Man-in-the-middle attack

C.

Monkey-in-the-middle attack

D.

ARP poisoning

Buy Now
Questions 50

You want that some of your Web pages should not be crawled. Which one of the following options will you use to accomplish the task?

Options:

A.

Use HTML NO Crawl tag in the Web page not to be crawled

B.

Place the name of restricted Web pages in the private.txt file

C.

Place the name of restricted Web pages in the robotes.txt file

D.

Enable the SSL

Buy Now
Questions 51

Which of the following TCSEC classes defines verified protection?

Options:

A.

Class B

B.

Class D

C.

Class A

D.

Class C

Buy Now
Questions 52

You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

Options:

A.

Remoxec

B.

Hk.exe

C.

PSExec

D.

GetAdmin.exe

Buy Now
Questions 53

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.11b

B.

IEEE 802.5

C.

IEEE 802.3

D.

IEEE 802.4

Buy Now
Questions 54

What does APNIC stand for?

Options:

A.

Asia-Pacific Network Information Center

B.

American-Pacific Network Information Center

C.

American Private Network Information Center

D.

Asian Private Network Information Center

Buy Now
Questions 55

Which of the following worms performs random scanning?

Options:

A.

BugBear

B.

SirCam

C.

Code red worm

D.

Klez

Buy Now
Questions 56

Which of the following tools can be used to automate the MITM attack?

Options:

A.

Hotspotter

B.

Airjack

C.

IKECrack

D.

Kismet

Buy Now
Questions 57

Which of the following statements about Fport is true?

Options:

A.

It works as a process viewer.

B.

It works as a datapipe on Windows.

C.

It works as a datapipe on Linux.

D.

It is a source port forwarder/redirector.

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Dec 22, 2024
Questions: 385

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99