Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPEN - GIAC Penetration Tester

Page: 10 / 12
Total 385 questions

Which of the following does NOT use a proxy software to protect users?

A.

Stateful inspection

B.

Packet filtering

C.

Application layer gateway

D.

Circuit level proxy server

Which of the following is the second half of the LAN manager Hash?

A.

0xAAD3B435B51404BB

B.

0xAAD3B435B51404CC

C.

0xAAD3B435B51404EE

D.

0xAAD3B435B51404AA

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

A.

Cain

B.

Kismet

C.

AirSnort

D.

PsPasswd

Which of the following Trojans does not use TCP protocol?

A.

Donald Dick

B.

Beast

C.

Back Oriffice

D.

NetBus

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

A.

Void11

B.

Airsnort

C.

Kismet

D.

Aeropeek

Which of the following techniques is used to monitor telephonic and Internet conversations by a third party?

A.

War driving

B.

War dialing

C.

Web ripping

D.

Wiretapping

Which of the following techniques are NOT used to perform active OS fingerprinting?

Each correct answer represents a complete solution. Choose all that apply.

A.

ICMP error message quoting

B.

Analyzing email headers

C.

Sniffing and analyzing packets

D.

Sending FIN packets to open ports on the remote system

Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?

A.

Kismet

B.

NetStumbler

C.

Ettercap

D.

Tcpdump

Which of the following is NOT a Back orifice plug-in?

A.

BOSOCK32

B.

STCPIO

C.

BOPeep

D.

Beast

Which of the following ports is used for NetBIOS null sessions?

A.

130

B.

139

C.

143

D.

131