Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
Questions # 101:

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Cross-site scripting

B.

Session sidejacking

C.

ARP spoofing

D.

Session fixation

Questions # 102:

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Using the longest key supported by hardware.

B.

Using a 16 bit SSID.

C.

Changing keys often.

D.

Using a non-obvious key.

Questions # 103:

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

Options:

A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size

Questions # 104:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

Gathering information

Determining the network range

Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Options:

A.

APNIC

B.

SuperScan

C.

ARIN

D.

RIPE

Questions # 105:

Which of the following is the correct syntax to create a null session?

Options:

A.

c:\>net view \\IP_addr\IPC$ "" /u: ""

B.

c:\>net view \\IPC$\IP_addr "" /u: ""

C.

c:\>net use \\IP_addr\IPC$ "" /u: ""

D.

c:\>net use \\IPC$\IP_addr "" /u: ""

Questions # 106:

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:

A.

Basic authentication

B.

Digest authentication

C.

NTLM authentication

D.

Microsoft Passport authentication

Questions # 107:

Which of the following techniques is used to monitor telephonic and Internet conversations by a third party?

Options:

A.

War driving

B.

War dialing

C.

Web ripping

D.

Wiretapping

Questions # 108:

Which of the following is a web ripping tool?

Options:

A.

Netcat

B.

NetBus

C.

SuperScan

D.

Black Widow

Questions # 109:

__________ firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network.

Options:

A.

packet filtering

B.

Screened host

C.

Dual homed host

D.

Screened subnet

Questions # 110:

Which of the following is NOT a Back orifice plug-in?

Options:

A.

BOSOCK32

B.

STCPIO

C.

BOPeep

D.

Beast

Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.