Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPEN - GIAC Penetration Tester

Page: 9 / 12
Total 385 questions

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint. Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

A.

nmap -O -p

B.

nmap -sS

C.

nmap -sU -p

D.

nmap –sT

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Using a 16 bit SSID.

B.

Changing keys often.

C.

Using the longest key supported by hardware.

D.

Using a non-obvious key.

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Using the longest key supported by hardware.

B.

Using a non-obvious key.

C.

Using a 16 bit SSID.

D.

Changing keys often.

Which of the following tools allows you to download World Wide Web sites from the Internet to a local computer?

A.

Netcraft

B.

HTTrack

C.

Netstat

D.

Cheops-ng

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

A.

Application layer

B.

Link layer

C.

Internet layer

D.

Transport Layer

Which of the following commands can be used for port scanning?

A.

nc -z

B.

nc -t

C.

nc -w

D.

nc –g

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

A.

Close port TCP 53.

B.

Change the default community string names.

C.

Upgrade SNMP Version 1 with the latest version.

D.

Install antivirus.

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Using the longest key supported by hardware.

B.

Using a 16 bit SSID.

C.

Changing keys often.

D.

Using a non-obvious key.

Which of the following statements about Fport is true?

A.

It works as a process viewer.

B.

It works as a datapipe on Windows.

C.

It works as a datapipe on Linux.

D.

It is a source port forwarder/redirector.

Which of the following nmap switches is used to perform ICMP netmask scanning?

A.

-PM

B.

-PB

C.

-PI

D.

-PS