Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPEN - GIAC Penetration Tester

Page: 12 / 12
Total 385 questions

Which of the following Penetration Testing steps includes network mapping and OS fingerprinting?

A.

Gather information

B.

Exploit

C.

Verify vulnerabilities

D.

Planning stage

Which of the following tools is based on the SATAN tool?

A.

Retina

B.

Internet scanner

C.

GFI LANguard

D.

SAINT

In which of the following attacks does the attacker overload the CAM table of the switch?

A.

Mac flooding

B.

Man-in-the-middle attack

C.

Monkey-in-the-middle attack

D.

ARP poisoning

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

A.

WPA2

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Which of the following tools is NOT used for wireless sniffing?

A.

AirMagnet

B.

Sniffer Wireless

C.

AiroPeek

D.

MiniStumbler