Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPEN - GIAC Penetration Tester

Page: 2 / 12
Total 385 questions

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

l Gathering information

l Determining the network range

l Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

A.

APNIC

B.

SuperScan

C.

RIPE

D.

ARIN

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

A.

WPA2 -EAP

B.

WPA-PSK

C.

WPA-EAP

D.

WEP

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

A.

Command injection attack

B.

Cross-Site Scripting attack

C.

Cross-Site Request Forgery

D.

Code injection attack

Which of the following attacks can be overcome by applying cryptography?

A.

Buffer overflow

B.

Web ripping

C.

DoS

D.

Sniffing

The scope of your engagement is to include a target organization located in California with a /24 block of addresses that they claim to completely own. Which site could you utilize to confirm that you have been given accurate information before starting reconnaissance activities?

A.

www.whois.net

B.

www.arin.nei

C.

www.apnic.net

D.

www.ripe.net

You want to search the Apache Web server having version 2.0 using google hacking. Which of the following search queries will you use?

A.

intitle:"Test Page for Apache Installation" "You are free"

B.

intitle:"Test Page for Apache Installation" "It worked!"

C.

intitle:test.page "Hey, it worked !" "SSl/TLS aware"

D.

intitle:Sample.page.for.Apache Apache.Hook.Function

Which of the following vulnerability scanner scans from CGI, IDA, Unicode, and Nimda vulnerabilities?

A.

Hackbot

B.

SARA

C.

Nessus

D.

Cgichk

You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?

A.

Cain and Abel

B.

Brutus

C.

Dsniff

D.

Nmap

Which of the following tools is spyware that makes Windows clients send their passwords as clear text?

A.

Pwddump2

B.

SMBRelay

C.

KrbCrack

D.

C2MYAZZ

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

A.

Fragroute

B.

Absinthe

C.

Stick

D.

ADMutate