2014年1月14日星期二

GIAC certification GPEN the latest exam questions and answers

GIAC GPEN exam materials of ITCertKing is devoloped in accordance with the latest syllabus. At the same time, we also constantly upgrade our training materials. So our exam training materials is simulated with the practical exam. So that the pass rate of ITCertKing is very high. It is an undeniable fact. Through this we can know that ITCertKing GIAC GPEN exam training materials can brought help to the candidates. And our price is absolutely reasonable and suitable for each of the candidates who participating in the IT certification exams.

Only to find ways to success, do not make excuses for failure. To pass the GIAC GPEN exam, in fact, is not so difficult, the key is what method you use. ITCertKing's GIAC GPEN exam training materials is a good choice. It will help us to pass the exam successfully. This is the best shortcut to success. Everyone has the potential to succeed, the key is what kind of choice you have.

If you are interested in ITCertKing's training program about GIAC certification GPEN exam, you can first on WWW.ITCertKing.COM to free download part of the exercises and answers about GIAC certification GPEN exam as a free try. We will provide one year free update service for those customers who choose ITCertKing's products.

ITCertKing GIAC GPEN exam dumps are the best reference materials. ITCertKing test questions and answers are the training materials you have been looking for. This is a special IT exam dumps for all candidates. ITCertKing pdf real questions and answers will help you prepare well enough for GIAC GPEN test in the short period of time and pass your exam successfully. If you don't want to waste a lot of time and efforts on the exam, you had better select ITCertKing GIAC GPEN dumps. Using this certification training dumps can let you improve the efficiency of your studying so that it can help you save much more time.

Exam Code: GPEN
Exam Name: GIAC (GIAC Certified Penetration Tester)
One year free update, No help, Full refund!
Total Q&A: 384 Questions and Answers
Last Update: 2014-01-13

The ITCertKing Free GIAC GPEN sample questions, allow you to enjoy the process of buying risk-free. This is a version of the exercises, so you can see the quality of the questions, and the value before you decide to buy. We are confident that ITCertKing the GIAC GPEN sample enough you satisfied with the product. In order to ensure your rights and interests,ITCertKing commitment examination by refund. Our aim is not just to make you pass the exam, we also hope you can become a true IT Certified Professional. Help you get consistent with your level of technology and technical posts, and you can relaxed into the IT white-collar workers to get high salary.

GPEN Free Demo Download: http://www.itcertking.com/GPEN_exam.html

NO.1 Adam works on a Linux system. He is using Sendmail as the primary application to transmit
emails.
Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log
files contains e-mail information such as source and destination IP addresses, date and time stamps
etc?
A. /log/var/logd
B. /var/log/logmail
C. /log/var/mailog
D. /var/log/mailog
Answer: D

GIAC pdf   GPEN   GPEN   GPEN study guide

NO.2 You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
A. Capture data on port 53 and performing banner grabbing.
B. Listen the incoming traffic on port 53 and execute the remote shell.
C. Listen the incoming data and performing port scanning.
D. Capture data on port 53 and delete the remote shell.
Answer: B

GIAC test answers   GPEN exam prep   GPEN   GPEN   GPEN practice test

NO.3 Which of the following are the scanning methods used in penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
A. Vulnerability
B. Port
C. Network
D. Services
Answer: A,B,C

GIAC   GPEN   GPEN test answers   GPEN

NO.4 Which of the following encryption modes are possible in WEP?
Each correct answer represents a complete solution. Choose all that apply.
A. No encryption
B. 256 bit encryption
C. 128 bit encryption
D. 40 bit encryption
Answer: A,C,D

GIAC   GPEN   GPEN pdf   GPEN   GPEN braindump

NO.5 TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to
the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the
attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored
and the port will drop the packet. Which of the following operating systems can be easily identified
with the help of TCP FIN scanning?
A. Solaris
B. Red Hat
C. Windows
D. Knoppix
Answer: C

GIAC certification training   GPEN   GPEN

NO.6 An executive in your company reports odd behavior on her PDA. After investigation you
discover that a trusted device is actually copying data off the PDA. The executive tells you that the
behavior started shortly after accepting an e-business card from an unknown person. What type of
attack is this?
A. Session Hijacking
B. PDA Hijacking
C. Privilege Escalation
D. Bluesnarfing
Answer: D

GIAC   GPEN   GPEN   GPEN   GPEN braindump

NO.7 Which of the following attacks allows an attacker to sniff data frames on a local area network
(LAN) or stop the traffic altogether?
A. Man-in-the-middle
B. ARP spoofing
C. Port scanning
D. Session hijacking
Answer: B

GIAC test questions   GPEN questions   GPEN   GPEN exam prep

NO.8 You work as a professional Ethical Hacker. You are assigned a project to perform blackhat
testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition
mechanic. You claim that someone from the office called you saying that there is some fault in the
air-conditioner of the server room. After some inquiries/arguments, the Security Administrator
allows you to repair the air-conditioner of the server room.
When you get into the room, you found the server is Linux-based. You press the reboot button of
the server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly
boots backup into Knoppix. You mount the root partition of the server after replacing the root
password in the /etc/shadow file with a known password hash and salt. Further, you copy the netcat
tool on the server and install its startup files to create a reverse tunnel and move a shell to a remote
server whenever the server is restarted. You simply restart the server, pull out the Knoppix Live CD
from the server, and inform that the air-conditioner is working properly.
After completing this attack process, you create a security auditing report in which you mention
various threats such as social engineering threat, boot from Live CD, etc. and suggest the
countermeasures to stop booting from the external media and retrieving sensitive data. Which of
the following steps have you suggested to stop booting from the external media and retrieving
sensitive data with regard to the above scenario?
Each correct answer represents a complete solution. Choose two.
A. Encrypting disk partitions
B. Using password protected hard drives
C. Placing BIOS password
D. Setting only the root level access for sensitive data
Answer: A,B

GIAC original questions   GPEN test   GPEN answers real questions   GPEN

NO.9 Which of the following tools is used to verify the network structure packets and confirm that
the packets are constructed according to specification?
A. EtherApe
B. Snort decoder
C. AirSnort
D. snort_inline
Answer: B

GIAC   GPEN   GPEN   GPEN

NO.10 Which of the following is NOT an example of passive footprinting?
A. Scanning ports.
B. Analyzing job requirements.
C. Performing the whois query.
D. Querying the search engine.
Answer: A

GIAC   GPEN demo   GPEN   GPEN exam

NO.11 Which of the following statements is true about the Digest Authentication scheme?
A. In this authentication scheme, the username and password are passed with every request, not
just when the user first types them.
B. A valid response from the client contains a checksum of the username, the password, the given
random value, the HTTP method, and the requested URL.
C. The password is sent over the network in clear text format.
D. It uses the base64 encoding encryption scheme.
Answer: B

GIAC exam dumps   GPEN   GPEN   GPEN certification training   GPEN

NO.12 Which of the following statements are true about KisMAC?
A. Data generated by KisMAC can also be saved in pcap format.
B. It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.
C. It scans for networks passively on supported cards.
D. It is a wireless network discovery tool for Mac OS X.
Answer: A,C,D

GIAC exam simulations   GPEN answers real questions   GPEN   GPEN   GPEN

NO.13 Which of the following statements are true about WPA?
Each correct answer represents a complete solution. Choose all that apply.
A. WPA-PSK converts the passphrase into a 256-bit key.
B. WPA provides better security than WEP .
C. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireles s client.
D. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.
Answer: A,B,C,D

GIAC   GPEN   GPEN dumps   GPEN   GPEN

NO.14 You have inserted a Trojan on your friend's computer and you want to put it in the startup so
that whenever the computer reboots the Trojan will start to run on the startup. Which of the
following registry entries will you edit to accomplish the task?
A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start
B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Answer: D

GIAC dumps   GPEN   GPEN   GPEN test   GPEN braindump

NO.15 Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
A. FindSA
B. SQLDict
C. nmap
D. SQLBF
Answer: A,B,D

GIAC   GPEN exam prep   GPEN questions   GPEN braindump   GPEN certification training   GPEN

NO.16 Which of the following statements are true about SSIDs?
Each correct answer represents a complete solution. Choose all that apply.
A. SSIDs are case insensitive text strings and have a maximum length of 64 characters.
B. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks
will create a conflict.
C. SSID is used to identify a wireless network.
D. All wireless devices on a wireless network must have the same SSID in order to communicate
with each other.
Answer: B,C,D

GIAC test questions   GPEN   GPEN

NO.17 Which of the following options holds the strongest password?
A. california
B. $#164aviD

没有评论:

发表评论