Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:
A.

Man-in-the-middle

B.

ARP spoofing

C.

Port scanning

D.

Session hijacking

GIAC GPEN Premium Access
Questions 12

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:
A.

Cross-site scripting

B.

Session fixation

C.

Session sidejacking

D.

ARP spoofing

Questions 13

Analyze the screenshot below, which of the following sets of results will be retrieved using this search?

GPEN Question 13

Options:
A.

Pages from the domain sans.edu that have external links.

B.

Files of type .php from the domain sans.edu.

C.

Pages that contain the term ext:php and slte.sans.edu.

D.

Files of type .php that redirect to the sans.edu domain.

Questions 14

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

Options:
A.

Post-attack phase

B.

Attack phase

C.

Pre-attack phase

D.

On-attack phase

Questions 15

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GPEN Question 15

Which of the following tools is John using to crack the wireless encryption keys?

Options:
A.

AirSnort

B.

PsPasswd

C.

Cain

D.

Kismet

Questions 16

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Using personal firewall software on your Laptop.

B.

Using a protocol analyzer on your Laptop to monitor for risks.

C.

Using portscanner like nmap in your network.

D.

Using an IPSec enabled VPN for remote connectivity.

Questions 17

Which of the following statements are true about NTLMv1?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

It uses the LANMAN hash of the user's password.

B.

It is mostly used when no Active Directory domain exists.

C.

It is a challenge-response authentication protocol.

D.

It uses the MD5 hash of the user's password.

Questions 18

What happens when you scan a broadcast IP address of a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

It will show an error in the scanning process.

B.

Scanning of the broadcast IP address cannot be performed.

C.

It may show smurf DoS attack in the network IDS of the victim.

D.

It leads to scanning of all the IP addresses on that subnet at the same time.

Questions 19

Which of the following tools allow you to perform HTTP tunneling?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

BackStealth

B.

Tunneled

C.

Nikto

D.

HTTPort

Questions 20

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:
A.

NTLM authentication

B.

Microsoft Passport authentication

C.

Basic authentication

D.

Digest authentication