Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers

Questions 1

What is the sequence in which packets are sent when establishing a connection to a secured network?

Options:
A.

Auth, Associate and Probe

B.

Probe, Auth and Associate

C.

Associate, Probe and Auth

D.

Probe. Associate and Auth

GIAC GPEN Premium Access
Questions 2

Write the appropriate attack name to fill in the blank.

In a _____________ DoS attack, the attacker sends a spoofed TCP SYN packet in which the IP address of the target is filled in both the source and destination fields.

Options:
Questions 3

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

Options:
A.

Idle scan

B.

TCP SYN scan

C.

Ping sweep scan

D.

XMAS scan

Questions 4

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Options:
A.

E-mail spoofing

B.

E-mail Spam

C.

E-mail bombing

D.

E-mail Storm

Questions 5

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

Options:
A.

Capture data on port 53 and performing banner grabbing.

B.

Capture data on port 53 and delete the remote shell.

C.

Listen the incoming traffic on port 53 and execute the remote shell.

D.

Listen the incoming data and performing port scanning.

Questions 6

Which of the following tools uses exploits to break into remote operating systems?

Options:
A.

Nessus

B.

Metasploit framework

C.

Nmap

D.

John the Ripper

Questions 7

You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

WEP key

B.

MAC address of the router

C.

IP address of the router

D.

SSID of the WLAN

Questions 8

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

Options:
A.

NetStumbler

B.

Snadboy's Revelation

C.

WEPCrack

D.

Kismet

Questions 9

Which of the following is a passive information gathering tool?

Options:
A.

Whois

B.

Snort

C.

Ettercap

D.

Nmap

Questions 10

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:
A.

Absinthe

B.

THC-Scan

C.

NetStumbler

D.

Kismet