Certleader GPEN Questions are updated and all GPEN answers are verified by experts. Once you have completely prepared with our GPEN exam prep kits you will be ready for the real GPEN exam without a problem. We have Down to date GIAC GPEN dumps study guide. PASSED GPEN First attempt! Here What I Did.
Free GPEN Demo Online For GIAC Certifitcation:
NEW QUESTION 1
Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?
- A. Implement WE
- B. Disabling SSID broadcas
- C. Change hub with switc
- D. Deploying a powerful antenn
Answer: B
NEW QUESTION 2
Which of the following is generally practiced by the police or any other recognized governmental authority?
- A. Spoofing
- B. Wiretapping
- C. Phishing
- D. SMB signing
Answer: B
NEW QUESTION 3
Given the following Scapy information, how is default Layer 2 information derived? 
- A. The default layer 2 information is contained in a local scapy.cfg configuration fileon the local syste
- B. If not explicitly defined, the Ether type field value Is created using the hex value ofthe destination port, in this case 80
- C. If not explicitly defined, pseudo-random values are generated for the Layer 2 defaultinformatio
- D. Scapy relies on the underlying operating system to construct Layer 2 information touse as defaul
Answer: C
NEW QUESTION 4
CORRECT TEXT
Write the appropriate attack name to fill in the blank.
In a _____________ DoS attack, the attacker sends a spoofed TCP SYN packet in which the IP address of the target is filled in both the source and destination fields.
- A.
Answer: land
NEW QUESTION 5
Which of the following is a web ripping tool?
- A. Netcat
- B. NetBus
- C. SuperScan
- D. Black Widow
Answer: D
NEW QUESTION 6
Which of the following Nmap commands is used to perform a UDP port scan?
- A. nmap -sS
- B. nmap -sY
- C. nmap -sN
- D. nmap –sU
Answer: D
NEW QUESTION 7
You work as an IT Technician for uCertify Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?
- A. MAC Filtering
- B. SSID
- C. RAS
- D. WEP
Answer: A
NEW QUESTION 8
Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?
- A. Application layer
- B. Link layer
- C. Internet layer
- D. Transport Layer
Answer: B
NEW QUESTION 9
Which of the following nmap switches is used to perform ICMP netmask scanning?
- A. -PM
- B. -PB
- C. -PI
- D. -PS
Answer: A
NEW QUESTION 10
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server:
Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?
Each correct answer represents a complete solution. Choose all that apply.
- A. PsFile
- B. PsPasswd
- C. UserInfo
- D. WinSSLMiM
Answer: ABC
NEW QUESTION 11
You work as a Network Administrator in the Secure Inc. Your company is facing various network attacks due to the insecure wireless network. You are assigned a task to secure your wireless network. For this, you have turned off broadcasting of the SSID. However, the unauthorized users are still able to connect to the wireless network. Which of the following statements can be the reason for this issue?
Each correct answer represents a complete solution. Choose all that apply.
- A. You have forgotten to turn off DHC
- B. You are using WPA2 security schem
- C. The SSID is still sent inside both client and AP packet
- D. You are using the default SSI
Answer: ACD
NEW QUESTION 12
Which of the following statements about SSID is NOT true?
- A. Default settings of SSIDs are secur
- B. All wireless devices on a wireless network must have the same SSID in order to communicate with each othe
- C. It acts as a password for network acces
- D. It is used to identify a wireless networ
Answer: A
NEW QUESTION 13
Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and 192.168.116.101. What factual conclusion can the tester draw from this output? 
- A. Port 135 is filtered, port 139 is ope
- B. Pons 135 and 139 are filtere
- C. Ports 139 and 135 are ope
- D. Port 139 is closed, port 135 is open
Answer: C
NEW QUESTION 14
John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.
Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:
<script>alert('Hi, John')</script>
After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."
Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?
- A. Replay attack
- B. Buffer overflow attack
- C. CSRF attack
- D. XSS attack
Answer: D
NEW QUESTION 15
Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?
- A. NetStumbler
- B. Tcpdump
- C. Kismet
- D. Ettercap
Answer: A
NEW QUESTION 16
......
P.S. Easily pass GPEN Exam with 385 Q&As Certshared Dumps & pdf Version, Welcome to Download the Newest Certshared GPEN Dumps: https://www.certshared.com/exam/GPEN/ (385 New Questions)