Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GPEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPEN Premium Access

View all detail and faqs for the GPEN exam


742 Students Passed

93% Average Score

92% Same Questions
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

A penetration tester used a client-side browser exploit from metasploit to get an unprivileged shell prompt on the target Windows desktop. The penetration tester then tried using the getsystem command to perform a local privilege escalation which failed. Which of the following could resolve the problem?

Options:

A.

Load priv module and try getsystem again

B.

Run getuid command, then getpriv command, and try getsystem again

C.

Run getuid command and try getsystem again

D.

Use getprivs command instead of getsystem

Questions # 62:

How does OWASP ZAP function when used for performing web application assessments?

Options:

A.

It is a non-transparent proxy that sits between your web browser and the targetapplication.

B.

It is a transparent policy proxy that sits between Java servers and |SP web pages.

C.

It is a non-transparent proxy that passively sniffs network traffic for HTTPvulnerabilities.

D.

It is a transparent proxy that sits between a target application and the backenddatabase.

Questions # 63:

Analyze the command output below, what action is being performed by the tester?

Question # 63

Options:

A.

Displaying a Windows SAM database

B.

Listing available workgroup services

C.

Discovering valid user accounts

D.

Querying locked out user accounts

Questions # 64:

Approximately how many packets are usually required to conduct a successful FMS attack onWEP?

Options:

A.

250.000

B.

20.000

C.

10.000,000

D.

l (with a weak IV)

Questions # 65:

A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?

Options:

A.

Use the http service's PUT command to push the file onto the target machine.

B.

Use the scp service, protocol SSHv2 to pull the file onto the target machine.

C.

Use the telnet service's ECHO option to pull the file onto the target machine

D.

Use the ftp service in passive mode to push the file onto the target machine.

Questions # 66:

Given the following Scapy information, how is default Layer 2 information derived?

Question # 66

Options:

A.

The default layer 2 information is contained in a local scapy.cfg configuration fileon the local system.

B.

If not explicitly defined, the Ether type field value Is created using the hex value ofthe destination port, in this case 80

C.

If not explicitly defined, pseudo-random values are generated for the Layer 2 defaultinformation.

D.

Scapy relies on the underlying operating system to construct Layer 2 information touse as default.

Questions # 67:

While performing a code audit, you discover a SQL injection vulnerability assuming the following vulnerable query, what user input could be injected to make the query true and return data?

select * from widgets where name = '[user-input]';

Options:

A.

'or 1=1

B.

‘or l=l…

C.

'or 1=1--

D.

‘or l=1’

Questions # 68:

You successfully compromise a target system's web application using blind command injection. The command you injected is ping-n 1 192.168.1.200. Assuming your machine is 192.168.1 200, which of the following would you see?

Options:

A.

Ping-n 1 192.168.1 200 on the compromised system

B.

A 'Destination host unreachable' error message on the compromised system

C.

A packet containing 'Packets: Sent - 1 Received = 1, Loss = 0 (0% loss) on yoursniffer

D.

An ICMP Echo packet on your sniffer containing the source address of the target

Questions # 69:

What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?

Options:

A.

Methodology

B.

Conclusions

C.

Executive Summary

D.

Findings

Questions # 70:

You've been contracted by the owner of a secure facility to try and break into their office in the middle of the night. Your client requested photographs of any sensitive information found as proof of your accomplishments. The job you've been hired to perform is an example of what practice?

Options:

A.

Penetration Testing

B.

Ethical Hacking

C.

Vulnerability Assessing

D.

Security Auditing

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.