Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPEN - GIAC Penetration Tester

Page: 3 / 12
Total 385 questions

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

A.

Port scanning

B.

Spoofing

C.

Cloaking

D.

Firewalking

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

A.

Site surveys

B.

Protocol analyzers

C.

Network anti-spyware software

D.

Network anti-virus software

Which of the following is the frequency range to tune IEEE 802.11a network?

A.

1.15-3.825 GHz

B.

5.15-5.825 GHz

C.

5.25-9.825 GHz

D.

6.25-9.825 GHz

Which of the following tools is used to verify the network structure packets and confirm that the packets are constructed according to specification?

A.

snort_inline

B.

EtherApe

C.

Snort decoder

D.

AirSnort

You want to create a binary log file using tcpdump. Which of the following commands will you use?

A.

tcpdump -B

B.

tcpdump -dd

C.

tcpdump -w

D.

tcpdump –d

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of the Bluehill Inc. For this, you start monitoring the network traffic of the Bluehill Inc.

In this process, you get that there are too many FTP packets traveling in the Bluehill Inc. network.

Now, you want to sniff the traffic and extract usernames and passwords of the FTP server. Which of the following tools will you use to accomplish the task?

A.

Ettercap

B.

L0phtcrack

C.

NetStumbler

D.

SARA

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

A.

Post-attack phase

B.

Attack phase

C.

Pre-attack phase

D.

On-attack phase

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymizer removes all the identifying information from a user's computer while the user surfs the Internet. It ensures the privacy of the user in this manner. After the user anonymizes a Web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Which of the following are limitations of anonymizers?

Each correct answer represents a complete solution. Choose all that apply.

A.

Java applications

B.

Secure protocols

C.

ActiveX controls

D.

JavaScript

E.

Plugins

Which of the following is a method of gathering user names from a Linux system?

A.

Displaying the owner information of system-specific binaries

B.

Reviewing the contents of the system log files

C.

Gathering listening services from the xinetd configuration files

D.

Extracting text strings from the system password file