Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 3

Questions 21

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

Options:
A.

Port scanning

B.

Spoofing

C.

Cloaking

D.

Firewalking

GIAC GPEN Premium Access
Questions 22

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

Options:
A.

MAC filtering the router

B.

Using WPA encryption

C.

Using WEP encryption

D.

Not broadcasting SSID

Questions 23

Fill in the blank with the appropriate act name.

The___ act gives consumers the right to ask emailers to stop spamming them.

Options:
Questions 24

You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?

Options:
A.

Cain and Abel

B.

Brutus

C.

Dsniff

D.

Nmap

Questions 25

Which of the following is the frequency range to tune IEEE 802.11a network?

Options:
A.

1.15-3.825 GHz

B.

5.15-5.825 GHz

C.

5.25-9.825 GHz

D.

6.25-9.825 GHz

Questions 26

Which of the following is the most common method for an attacker to spoof email?

Options:
A.

Back door

B.

Replay attack

C.

Man in the middle attack

D.

Open relay

Questions 27

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:
A.

Performs the XSS attacks.

B.

Deletes the entire members table.

C.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

D.

Deletes the database in which members table resides.

Questions 28

What difference would you expect to result from running the following commands;

(I). S dig ©ns domain.com target.com -t AXFR

and

(2). S dig ©ns.domain.com target.com -t IXFR=1002200301

Options:
A.

Command (I) will display incremental information about a domain and command (2)

Will provide only 1002200301 bytes of information

B.

Command (1) will display all information about a domain and command (2) willprovide only incremental updates from SOA 1002200301

C.

Command (I) will display all information about a domain and command (2) willprovide only incremental updates up to SOA 1002200301

D.

Command (I) will display all information about a domain and command (2) willprovide only 1002200301 bytes of information

Questions 29

Which of the following standards is used in wireless local area networks (WLANs)?

Options:
A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Questions 30

Which of the following event logs contains traces of brute force attempts performed by an attacker?

Options:
A.

SysEvent.Evt

B.

WinEvent.Evt

C.

AppEvent.Evt

D.

SecEvent.Evt