Exambible offers free demo for GPEN exam. "GIAC Certified Penetration Tester", also known as GPEN exam, is a GIAC Certification. This set of posts, Passing the GIAC GPEN exam, will help you answer those questions. The GPEN Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GPEN exams and revised by experts!

GIAC GPEN Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

Your company has decided that the risk of performing a penetration test Is too great. You would like to figure out other ways to find vulnerabilities on their systems, which of the following is MOST likely to be a valid alternative?

  • A. Network scope Analysis
  • B. Baseline Data Reviews
  • C. Patch Policy Review
  • D. Configuration Reviews

Answer: A

NEW QUESTION 2

When sniffing wireless frames, the interface mode plays a key role in successfully collecting traffic. Which of the mode or modes are best used for sniffing wireless traffic?

  • A. Master Ad-hoc
  • B. RFMON
  • C. RFMO
  • D. Ad-hoc
  • E. Ad-hoc

Answer: A

Explanation:
Reference:
http://www.willhackforsushi.com/books/377_eth_2e_06.pdf

NEW QUESTION 3

If a password is seven characters or less, the second half of the LM hash is always ___________________.

  • A. 0xAAD3B4EE
  • B. 0xAAD3B4FF
  • C. 0xAAD3B435B51404FF
  • D. 0xAAD3B435B51404EE

Answer: D

NEW QUESTION 4

Which of the following tasks is NOT performed into the enumeration phase?

  • A. Discovering NetBIOS names
  • B. Obtaining Active Directory information and identifying vulnerable user accounts
  • C. Injecting a backdoor to the remote computer to gain access in it remotely
  • D. Establishing NULL sessions and queries

Answer: C

NEW QUESTION 5

You have compromised a Windows workstation using Metasploit and have injected the Meterpreter payload into the smss process. You want to dump the SAM database of the remote system so you can crack it offline. Which Meterpreter module would you need to load in addition to the defaults so that you can accomplish this?

  • A. Core
  • B. Priv
  • C. Stdapi
  • D. Hashdump

Answer: C

NEW QUESTION 6

Which of the following TCSEC classes defines verified protection?

  • A. Class B
  • B. Class D
  • C. Class A
  • D. Class C

Answer: C

NEW QUESTION 7

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Public key certificate for server authentication
  • B. Password hash for client authentication
  • C. Strongest security level
  • D. Dynamic key encryption

Answer: BD

NEW QUESTION 8

Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Privacy (WEP) effectively provides?

  • A. 64
  • B. 40
  • C. 60
  • D. 44

Answer: A

Explanation:
Reference:
http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy

NEW QUESTION 9

Approximately how many packets are usually required to conduct a successful FMS attack onWEP?

  • A. 250.000
  • B. 20.000
  • C. 10.000,000
  • D. l (with a weak IV)

Answer: B

NEW QUESTION 10

Which of the following Trojans does not use TCP protocol?

  • A. Donald Dick
  • B. Beast
  • C. Back Oriffice
  • D. NetBus

Answer: C

NEW QUESTION 11

Analyze the screenshot below, which of the following sets of results will be retrieved using this search?
GPEN dumps exhibit

  • A. Pages from the domain sans.edu that have external link
  • B. Files of type .php from the domain sans.ed
  • C. Pages that contain the term ext:php and slte.sans.ed
  • D. Files of type .php that redirect to the sans.edu domai

Answer: A

NEW QUESTION 12

Which of the following tools is used for port redirection?

  • A. SubSeven
  • B. Fpipe
  • C. NetBus
  • D. Loki

Answer: B

NEW QUESTION 13

You've been asked to test a non-transparent proxy lo make sure it is working. After confirming the browser is correctly pointed at the proxy, you try to browse a web site. The browser indicates it is "loading" but never displays any part the page. Checking the proxy, you see a valid request in the proxy from your browser. Checking the response to the proxy, you see the results displayed in the accompanying screenshot. Which of the following answers is the most likely reason the browser hasn't displayed the page yet?
GPEN dumps exhibit

  • A. The proxy is likely hung and must be restarte
  • B. The proxy is configured to trap response
  • C. The proxy is configured to trap request
  • D. The site you are trying to reach is currently dow

Answer: C

NEW QUESTION 14

Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.

  • A. Cross site scripting attack
  • B. SQL injection attack
  • C. Bluesnarfing
  • D. Bluebug attack
  • E. Social engineering

Answer: CD

NEW QUESTION 15

You want to retrieve the default security report of nessus. Which of the following google search queries will you use?

  • A. site:pdf nessus "Assessment report"
  • B. filetype:pdf nessus
  • C. filetype:pdf "Assessment Report" nessus
  • D. link:pdf nessus "Assessment report"

Answer: C

NEW QUESTION 16
......

Thanks for reading the newest GPEN exam dumps! We recommend you to try the PREMIUM Certleader GPEN dumps in VCE and PDF here: https://www.certleader.com/GPEN-dumps.html (385 Q&As Dumps)