Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 4

Questions 31

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GPEN Question 31

Which of the following tools is John using to crack the wireless encryption keys?

Options:
A.

Kismet

B.

AirSnort

C.

Cain

D.

PsPasswd

GIAC GPEN Premium Access
Questions 32

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:
A.

MINIX 3

B.

Linux

C.

Windows XP

D.

Mac OS

Questions 33

Which of the following TCSEC classes defines verified protection?

Options:
A.

Class B

B.

Class D

C.

Class A

D.

Class C

Questions 34

Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?

Options:
A.

Kismet

B.

NetStumbler

C.

Ettercap

D.

Tcpdump

Questions 35

Which of the following options holds the strongest password?

Options:
A.

Joe12is23good

B.

$#164aviD^%

C.

california

D.

Admin1234

Questions 36

__________ firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network.

Options:
A.

packet filtering

B.

Screened host

C.

Dual homed host

D.

Screened subnet

Questions 37

Which of the following is NOT a Back orifice plug-in?

Options:
A.

BOSOCK32

B.

STCPIO

C.

BOPeep

D.

Beast

Questions 38

Which of the following tools is an example of HIDS?

Options:
A.

Anti-Spector

B.

Auditpol.exe

C.

Elsave

D.

Log File Monitor

Questions 39

Which of the following Penetration Testing steps includes network mapping and OS fingerprinting?

Options:
A.

Gather information

B.

Exploit

C.

Verify vulnerabilities

D.

Planning stage

Questions 40

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

Options:
A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size