GIAC GPEN - GIAC Penetration Tester
Which of the following does NOT use a proxy software to protect users?
Which of the following is the second half of the LAN manager Hash?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?
Which of the following Trojans does not use TCP protocol?
Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?
Which of the following techniques is used to monitor telephonic and Internet conversations by a third party?
Which of the following techniques are NOT used to perform active OS fingerprinting?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?
Which of the following is NOT a Back orifice plug-in?
Which of the following ports is used for NetBIOS null sessions?
