Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are

NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Not broadcasting SSID

B.

MAC filtering on the router

C.

Strong password policies on workstations.

D.

Using either WEP or WPA encryption

E.

Hardening the server OS

Questions # 32:

Which of the following tools can be used to enumerate networks that have blocked ICMP Echo packets, however, failed to block timestamp or information packet or not performing sniffing of trusted addresses, and it also supports spoofing and promiscuous listening for reply packets?

Options:

A.

Nmap

B.

Zenmap

C.

Icmpenum

D.

Nessus

Questions # 33:

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Ettercap

B.

Nmap

C.

Netcraft

D.

Ethereal

Questions # 34:

What happens when you scan a broadcast IP address of a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It leads to scanning of all the IP addresses on that subnet at the same time.

B.

It will show an error in the scanning process.

C.

It may show smurf DoS attack in the network IDS of the victim.

D.

Scanning of the broadcast IP address cannot be performed.

Questions # 35:

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Brute Force attack

B.

Dictionary attack

C.

Hybrid attack

D.

Rule based attack

Questions # 36:

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Options:

A.

Single quote (')

B.

Semi colon (;)

C.

Double quote (")

D.

Dash (-)

Questions # 37:

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Web ripping

B.

Sniffing

C.

DoS

D.

Buffer overflow

Questions # 38:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He uses a Windows XP operating system to do this. He enters the following command on the command prompt:

c:\tracert www.we-are-secure.com

However, he receives an incomplete traceroute result. What could be the reasons for getting an incomplete result for the tracert command?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A router along the path is overloaded.

B.

John's computer is behind a firewall that blocks incoming ICMP error messages.

C.

There is no route to the we-are-secure server.

D.

The we-are-secure server is down and is not connected to the Internet.

Questions # 39:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:

A.

IEEE 802.1X using EAP-TLS

B.

IEEE 802.1X using PEAP-MS-CHAP

C.

Pre-shared key

D.

Open system

Questions # 40:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:

A.

FTK Imager

B.

FAU

C.

Device Seizure

D.

Galleta

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.