Pass4Test a capacité d'économiser vos temps et de vous faire plus confiant à réussir le test. Vous pouvez télécharger le démo GIAC GPEN gratuit à connaître mieux la bonne fiabilité de Pass4Test. Nous nous font toujours confiant sur nos produits, et vous aussi dans un temps proche. La réussite de test GIAC GPEN n'est pas loin de vous une fois que vous choisissez le produit de Pass4Test. C'est un choix élégant pour vous faciliter à réussir le test GIAC GPEN.
GPEN est un test de GIAC Certification, donc réussir GPEN est le premier pas à mettre le pied sur la Certifiction GIAC. Ça peut expliquer certiainement pourquoi le test GIAC GPEN devient de plus en plus chaud, et il y a de plus en plus de gens qui veulent participer le test GPEN. Au contraire, il n'y a que pas beaucoup de gens qui pourrait réussir ce test. Dans ce cas, si vous vous réfléchissez étudier avec une bonne Q&A?
Pass4Test est un site web qui vous donne plus de chances à passer le test de Certification GIAC GPEN. Le résultat de recherche sortis par les experts de Pass4Test peut assurer que ce sera vous ensuite qui réussirez le test GIAC GPEN. Choisissez Pass4Test, choisissez le succès. L'outil de se former de Pass4Test est bien efficace. Parmi les gens qui ont déjà passé le test, la majorité a préparé le test avec la Q&A de Pass4Test.
Vous choisissez l'aide de Pass4Test, Pass4Test fait tous effort à vous aider à réussir le test. De plus, la mise à jour de Q&A pendant un an est gratuite pour vous. Vous n'avez plus raison à hésiter. Pass4Test est une meilleure assurance pour le succès de test GIAC GPEN. Ajoutez la Q&A au panier.
Code d'Examen: GPEN
Nom d'Examen: GIAC (GIAC Certified Penetration Tester)
Questions et réponses: 384 Q&As
Les produits de Pass4Test sont recherchés par les experts de Pass4Test qui se profitent de leurs connaissances et leurs expériences dans l'Idustrie IT. Si vous allez participer le test GIAC GPEN, vous devez choisir Pass4Test. La Q&A de Pass4Test peut vous aider à préparer mieux le test GIAC GPEN avec sa grande couiverture des questions. En face d'un test très difficile, vous pouvez obtenir le Certificat GIAC GPEN sans aucune doute.
GPEN Démo gratuit à télécharger: http://www.pass4test.fr/GPEN.html
NO.1 Which of the following statements are true about WPA?
Each correct answer represents a complete solution. Choose all that apply.
A. WPA-PSK converts the passphrase into a 256-bit key.
B. WPA provides better security than WEP .
C. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireles s client.
D. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.
Answer: A,B,C,D
certification GIAC GPEN GPEN
NO.2 Which of the following is NOT an example of passive footprinting?
A. Scanning ports.
B. Analyzing job requirements.
C. Performing the whois query.
D. Querying the search engine.
Answer: A
GIAC examen GPEN GPEN
NO.3 You have inserted a Trojan on your friend's computer and you want to put it in the startup so
that whenever the computer reboots the Trojan will start to run on the startup. Which of the
following registry entries will you edit to accomplish the task?
A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start
B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Answer: D
GIAC certification GPEN GPEN examen GPEN GPEN
NO.4 You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an
unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by
your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after
noticing the following string in the log file:
(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)
When you find All your 802.11b are belong to us as the payload string, you are convinced about
which tool is being used for the unauthorized access. Which of the following tools have you
ascertained?
A. AirSnort
B. Kismet
C. AiroPeek
D. NetStumbler
Answer: D
certification GIAC GPEN GPEN GPEN GPEN
NO.5 Which of the following encryption modes are possible in WEP?
Each correct answer represents a complete solution. Choose all that apply.
A. No encryption
B. 256 bit encryption
C. 128 bit encryption
D. 40 bit encryption
Answer: A,C,D
GIAC GPEN certification GPEN GPEN GPEN
NO.6 Which of the following attacks allows an attacker to sniff data frames on a local area network
(LAN) or stop the traffic altogether?
A. Man-in-the-middle
B. ARP spoofing
C. Port scanning
D. Session hijacking
Answer: B
GIAC examen GPEN GPEN
NO.7 You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
A. Capture data on port 53 and performing banner grabbing.
B. Listen the incoming traffic on port 53 and execute the remote shell.
C. Listen the incoming data and performing port scanning.
D. Capture data on port 53 and delete the remote shell.
Answer: B
certification GIAC certification GPEN GPEN certification GPEN
NO.8 You work as a professional Ethical Hacker. You are assigned a project to perform blackhat
testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition
mechanic. You claim that someone from the office called you saying that there is some fault in the
air-conditioner of the server room. After some inquiries/arguments, the Security Administrator
allows you to repair the air-conditioner of the server room.
When you get into the room, you found the server is Linux-based. You press the reboot button of
the server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly
boots backup into Knoppix. You mount the root partition of the server after replacing the root
password in the /etc/shadow file with a known password hash and salt. Further, you copy the netcat
tool on the server and install its startup files to create a reverse tunnel and move a shell to a remote
server whenever the server is restarted. You simply restart the server, pull out the Knoppix Live CD
from the server, and inform that the air-conditioner is working properly.
After completing this attack process, you create a security auditing report in which you mention
various threats such as social engineering threat, boot from Live CD, etc. and suggest the
countermeasures to stop booting from the external media and retrieving sensitive data. Which of
the following steps have you suggested to stop booting from the external media and retrieving
sensitive data with regard to the above scenario?
Each correct answer represents a complete solution. Choose two.
A. Encrypting disk partitions
B. Using password protected hard drives
C. Placing BIOS password
D. Setting only the root level access for sensitive data
Answer: A,B
GIAC GPEN certification GPEN GPEN GPEN
NO.9 A Web developer with your company wants to have wireless access for contractors that come
in to work on various projects. The process of getting this approved takes time. So rather than wait,
he has put his own wireless router attached to one of the network ports in his department. What
security risk does this present?
A. An unauthorized WAP is one way for hackers to get into a network.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. None, adding a wireless access point is a common task and not a security risk.
Answer: A
GIAC GPEN examen certification GPEN GPEN
NO.10 An executive in your company reports odd behavior on her PDA. After investigation you
discover that a trusted device is actually copying data off the PDA. The executive tells you that the
behavior started shortly after accepting an e-business card from an unknown person. What type of
attack is this?
A. Session Hijacking
B. PDA Hijacking
C. Privilege Escalation
D. Bluesnarfing
Answer: D
GIAC GPEN certification GPEN certification GPEN
NO.11 Which of the following statements are true about KisMAC?
A. Data generated by KisMAC can also be saved in pcap format.
B. It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.
C. It scans for networks passively on supported cards.
D. It is a wireless network discovery tool for Mac OS X.
Answer: A,C,D
certification GIAC certification GPEN GPEN
NO.12 Which of the following are the scanning methods used in penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
A. Vulnerability
B. Port
C. Network
D. Services
Answer: A,B,C
GIAC examen certification GPEN GPEN examen GPEN examen certification GPEN
NO.13 Adam works on a Linux system. He is using Sendmail as the primary application to transmit
emails.
Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log
files contains e-mail information such as source and destination IP addresses, date and time stamps
etc?
A. /log/var/logd
B. /var/log/logmail
C. /log/var/mailog
D. /var/log/mailog
Answer: D
GIAC examen GPEN examen GPEN examen GPEN GPEN
NO.14 Which of the following statements is true about the Digest Authentication scheme?
A. In this authentication scheme, the username and password are passed with every request, not
just when the user first types them.
B. A valid response from the client contains a checksum of the username, the password, the given
random value, the HTTP method, and the requested URL.
C. The password is sent over the network in clear text format.
D. It uses the base64 encoding encryption scheme.
Answer: B
GIAC GPEN examen certification GPEN GPEN
NO.15 Which of the following options holds the strongest password?
A. california
B. $#164aviD
没有评论:
发表评论