Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


371 Students Passed

91% Average Score

96% Same Questions
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

Analyze the screenshot below, which of the following sets of results will be retrieved using this search?

Question # 1

Options:

A.

Pages from the domain sans.edu that have external links.

B.

Files of type .php from the domain sans.edu.

C.

Pages that contain the term ext:php and slte.sans.edu.

D.

Files of type .php that redirect to the sans.edu domain.

Questions # 2:

Which of the following is the frequency range to tune IEEE 802.11a network?

Options:

A.

1.15-3.825 GHz

B.

5.15-5.825 GHz

C.

5.25-9.825 GHz

D.

6.25-9.825 GHz

Questions # 3:

You have obtained the hash below from the /etc/shadow file. What are you able to discern simply by looking at this hash?

Question # 3

Options:

A.

A4XD$B4COCqWaEpFjLLDe. is a SHAI hash that was created using the salt $1

SuWeOhL6k$ 1

B.

A4XD$B4COCqWaEpFjLLDe. is an MD5 hash that was created using the salt $1

SuWeOhL6k$

C.

A4XDsB4COGqWaEpFjLLDe. is an MD5 hash that was created using the salt

uWeOhL6k

D.

A4XDsB4COCqWaEpFjLLDe. is a SHAI hash that was created using the salt

uweohL6k

Questions # 4:

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Options:

A.

E-mail spoofing

B.

E-mail Spam

C.

E-mail bombing

D.

E-mail Storm

Questions # 5:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the

Linux terminal:chmod 741 secure.c

Considering the above scenario, which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

John is restricting a guest to only write or execute the secure.c file.

B.

John is providing all rights to the owner of the file.

C.

By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

D.

The textual representation of the file access permission of 741 will be -rwxr--rw-.

Questions # 6:

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email you@gmail.com' and press the submit button. The Web application displays the server error.

What can be the reason of the error?

Options:

A.

The remote server is down.

B.

You have entered any special character in email.

C.

Your internet connection is slow.

D.

Email entered is not valid.

Questions # 7:

Which of the following statements are true about NTLMv1?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It uses the LANMAN hash of the user's password.

B.

It is mostly used when no Active Directory domain exists.

C.

It is a challenge-response authentication protocol.

D.

It uses the MD5 hash of the user's password.

Questions # 8:

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:

A.

Performs the XSS attacks.

B.

Deletes the entire members table.

C.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

D.

Deletes the database in which members table resides.

Questions # 9:

You want to search the Apache Web server having version 2.0 using google hacking. Which of the following search queries will you use?

Options:

A.

intitle:"Test Page for Apache Installation" "You are free"

B.

intitle:"Test Page for Apache Installation" "It worked!"

C.

intitle:test.page "Hey, it worked !" "SSl/TLS aware"

D.

intitle:Sample.page.for.Apache Apache.Hook.Function

Questions # 10:

You run the rdisk /s command to retrieve the backup SAM file on a computer. Where should you go on the computer to find the file?

Options:

A.

%systemroot%\password\sam._

B.

%systemroot%\sam._

C.

%systemroot%\repair\sam._

D.

%systemroot%\backup\sam._

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.