Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

Options:

A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size

Questions # 112:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Question # 112

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

AirSnort

C.

Cain

D.

PsPasswd

Questions # 113:

Which of the following is NOT a Back orifice plug-in?

Options:

A.

BOSOCK32

B.

STCPIO

C.

BOPeep

D.

Beast

Questions # 114:

Which of the following tools is used for SNMP enumeration?

Options:

A.

SARA

B.

Userinfo

C.

Getif

D.

Enum

Questions # 115:

Which of the following is the correct sequence of packets to perform the 3-way handshake method?

Options:

A.

SYN, ACK, ACK

B.

SYN, ACK, SYN/ACK

C.

SYN, SYN/ACK, ACK

D.

SYN, SYN, ACK

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.