Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GPEN - GIAC Penetration Tester

Page: 6 / 12
Total 385 questions

You've been asked to test a non-transparent proxy lo make sure it is working. After confirming the browser is correctly pointed at the proxy, you try to browse a web site. The browser indicates it is "loading" but never displays any part the page. Checking the proxy, you see a valid request in the proxy from your browser. Checking the response to the proxy, you see the results displayed in the accompanying screenshot. Which of the following answers is the most likely reason the browser hasn't displayed the page yet?

A.

The proxy is likely hung and must be restarted.

B.

The proxy is configured to trap responses.

C.

The proxy is configured to trap requests.

D.

The site you are trying to reach is currently down.

Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?

A.

Vncinject/find.lag

B.

Vncinject/reverse.tcp

C.

Vncinject/reverse-http

D.

Vncinject /bind.tcp

What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?

A.

Methodology

B.

Conclusions

C.

Executive Summary

D.

Findings

Your company has decided that the risk of performing a penetration test Is too great. You would like to figure out other ways to find vulnerabilities on their systems, which of the following is MOST likely to be a valid alternative?

A.

Network scope Analysis

B.

Baseline Data Reviews

C.

Patch Policy Review

D.

Configuration Reviews

When DNS is being used for load balancing, why would a penetration tester choose to identify a scan target by its IP address rather than its host name?

A.

Asingle IP may have multiple domains.

B.

A single domain name can only have one IP address.

C.

Scanning tools only recognize IP addresses

D.

A single domain name may have multiple IP addresses.

Analyze the screenshot below. What event is depicted?

A.

An exploit that was attempted does not work against the target selected.

B.

A payload was used that is not compatible with the chosen exploit.

C.

The exploit is designed to work against the local host only.

D.

The payload Is designed to create an interactive session.

As pan or a penetration lest, your team is tasked with discovering vulnerabilities that could be exploited from an inside threat vector. Which of the following activities fall within that scope?

A.

SQL injection attacks against the hr intranet website.

B.

A competitor's employee's scanning the company's website.

C.

Wireless "war driving" the company manufacturing site.

D.

Running a Nessus scan from the sales department network.

E.

B, C, and D

F.

A, B. and D

G.

B and D

By default Active Directory Controllers store password representations in which file?

A.

%system roots .system 32/ntds.dit

B.

%System roots /ntds\ntds.dit

C.

%System roots /ntds\sam.dat

D.

%System roots /ntds\sam.dit

You work as an IT Technician for uCertify Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

A.

MAC Filtering

B.

SSID

C.

RAS

D.

WEP

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam's system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.