Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

MINIX 3

B.

Linux

C.

Windows XP

D.

Mac OS

Questions # 92:

Which of the following IEEE standards defines Wired Equivalent Privacy encryption scheme?

Options:

A.

802.15

B.

802.11b

C.

802.11a

D.

802.11g

Questions # 93:

Which of the following statements about SSID is NOT true?

Options:

A.

Default settings of SSIDs are secure.

B.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

C.

It acts as a password for network access.

D.

It is used to identify a wireless network.

Questions # 94:

You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

Options:

A.

256

B.

512

C.

1024

D.

64

Questions # 95:

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

Options:

A.

WPA2

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Questions # 96:

Which of the following is the second half of the LAN manager Hash?

Options:

A.

0xAAD3B435B51404BB

B.

0xAAD3B435B51404CC

C.

0xAAD3B435B51404EE

D.

0xAAD3B435B51404AA

Questions # 97:

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

C.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Questions # 98:

Which of the following nmap switches is used to perform ICMP netmask scanning?

Options:

A.

-PM

B.

-PB

C.

-PI

D.

-PS

Questions # 99:

Which of the following tools is an example of HIDS?

Options:

A.

Anti-Spector

B.

Auditpol.exe

C.

Elsave

D.

Log File Monitor

Questions # 100:

Which of the following is the default port value of beast Trojan?

Options:

A.

6666

B.

2222

C.

3333

D.

1111

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.