Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPEN - GIAC Penetration Tester

Page: 11 / 12
Total 385 questions

Which of the following tools can be used for session splicing attacks?

A.

ADMutate

B.

APNIC

C.

Whisker

D.

ARIN

How many bits encryption does SHA-1 use?

A.

128

B.

140

C.

512

D.

160

LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.

A.

0xAAD3B435B51404EE

B.

0xBBD3B435B51504FF

C.

0xBBC3C435C51504EF

D.

0xAAD3B435B51404FF

Which of the following tools can be used to find a username from a SID?

A.

SNMPENUM

B.

SID

C.

SID2User

D.

SIDENUM

Which of the following is a tool for SSH and SSL MITM attacks?

A.

Ettercap

B.

Cain

C.

Dsniff

D.

AirJack

What does APNIC stand for?

A.

Asia-Pacific Network Information Center

B.

American-Pacific Network Information Center

C.

American Private Network Information Center

D.

Asian Private Network Information Center

Which of the following statements about SSID is NOT true?

A.

Default settings of SSIDs are secure.

B.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

C.

It acts as a password for network access.

D.

It is used to identify a wireless network.

Which of the following tools can be used to automate the MITM attack?

A.

Hotspotter

B.

Airjack

C.

IKECrack

D.

Kismet

Which of the following is a web ripping tool?

A.

Netcat

B.

NetBus

C.

SuperScan

D.

Black Widow

What does TCSEC stand for?

A.

Trusted Computer System Evaluation Criteria

B.

Target Computer System Evaluation Criteria

C.

Trusted Computer System Experiment Criteria

D.

Trusted Computer System Evaluation Center