Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

The scope of your engagement is to include a target organization located in California with a /24 block of addresses that they claim to completely own. Which site could you utilize to confirm that you have been given accurate information before starting reconnaissance activities?

Options:

A.

www.whois.net

B.

www.arin.nei

C.

www.apnic.net

D.

www.ripe.net

Questions # 12:

Which of the following tools uses exploits to break into remote operating systems?

Options:

A.

Nessus

B.

Metasploit framework

C.

Nmap

D.

John the Ripper

Questions # 13:

Which of the following tools can be used to perform Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

Cain

B.

L0phtcrack

C.

Pass-the-hash toolkit

D.

John the Ripper

Questions # 14:

Which of the following tools is spyware that makes Windows clients send their passwords as clear text?

Options:

A.

Pwddump2

B.

SMBRelay

C.

KrbCrack

D.

C2MYAZZ

Questions # 15:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Active Directory domain-based network. The domain consists of a domain controller, two Windows 2003 member servers, and one hundred client computers. The company employees use laptops with Windows XP Professional. These laptops are equipped with wireless network cards that are used to connect to access points located in the Marketing department of the company. The company employees log on to the domain by using a user name and password combination. The wireless network has been configured with WEP in addition to 802.1x. Mark wants to provide the best level of security for the kind of authentication used by the company. What will Mark do to accomplish the task?

Options:

A.

Use EAP-TLS

B.

Use MD5

C.

Use PEAP

D.

Use IPSec

Questions # 16:

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Cross-site scripting

B.

Session fixation

C.

Session sidejacking

D.

ARP spoofing

Questions # 17:

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WEP

B.

Implement MAC filtering

C.

Don't broadcast SSID

D.

Implement WPA

Questions # 18:

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Checkpoint files

B.

cookie files

C.

Temporary files

D.

EDB and STM database files

Questions # 19:

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters= 'or''=' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.

Use the session_regenerate_id() function

B.

Use the escapeshellcmd() function

C.

Use the mysql_real_escape_string() function for escaping input

D.

Use the escapeshellarg() function

Questions # 20:

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Windows XP

B.

Mac OS

C.

MINIX 3

D.

Linux

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.