Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following statements are true about the Enum tool?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is capable of performing brute force and dictionary attacks on individual accounts of Windows NT/2000.

B.

One of the countermeasures against the Enum tool is to disable TCP port 139/445.

C.

It is a console-based Win32 information enumeration utility.

D.

It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information, etc.

Questions # 52:

Adam is a novice Internet user. He is using Google search engine to search documents of his interest. Adam wants to search the text present in the link of a Website. Which of the following operators will he use in his query to accomplish the task?

Options:

A.

inanchor

B.

info

C.

link

D.

site

Questions # 53:

You enter the following URL on your Web browser:

http://www.we-are-secure.com/scripts/..%co%af../..%co%

af../windows/system32/cmd.exe?/c+dir+c:\

What task do you want to perform?

Options:

A.

Perform buffer overflow attack.

B.

Perform DDoS attack.

C.

View the directory list of c drive.

D.

Perform DoS attack.

Questions # 54:

Which of the following tools automates password guessing in the NetBIOS session?

Options:

A.

L0phtCrack

B.

John the Ripper

C.

Legion

D.

NTInfoScan

Questions # 55:

Which of the following tools can be used to automate the MITM attack?

Options:

A.

Hotspotter

B.

Airjack

C.

Kismet

D.

IKECrack

Questions # 56:

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Close port TCP 53.

B.

Change the default community string names.

C.

Upgrade SNMP Version 1 with the latest version.

D.

Install antivirus.

Questions # 57:

John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.

For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

Options:

A.

ICMP ping flood tool

B.

Kismet

C.

Netstumbler

D.

AirSnort

Questions # 58:

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker can use the Ping Flood DoS attack if WZC is used.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Questions # 59:

Based on the partial appdefstrig rile listed below, which port scan signature is classified by AMap as harmful?

Question # 59

Options:

A.

smtp

B.

netbios-session

C.

http-trace

D.

ms-remote-desktop-protocol

Questions # 60:

What is the purpose of the following command?

C:\>wmic /node:[target IP] /user:[admin-user]

/password:[password] process call create [command]

Options:

A.

Running a command on a remote Windows machine

B.

Creating a service on a remote Windows machine

C.

Creating an admin account on a remote Windows machine

D.

Listing the running processes on a remote windows machine

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.