Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 5

Questions 41

Which of the following is the default port value of beast Trojan?

Options:
A.

6666

B.

2222

C.

3333

D.

1111

GIAC GPEN Premium Access
Questions 42

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Strongest security level

B.

Dynamic key encryption

C.

Password hash for client authentication

D.

Public key certificate for server authentication

Questions 43

Which of the following tools can be used to find a username from a SID?

Options:
A.

SNMPENUM

B.

SID

C.

SID2User

D.

SIDENUM

Questions 44

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

Gathering information

Determining the network range

Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Options:
A.

APNIC

B.

SuperScan

C.

ARIN

D.

RIPE

Questions 45

How many bits encryption does SHA-1 use?

Options:
A.

128

B.

140

C.

512

D.

160

Questions 46

Which of the following is a tool for SSH and SSL MITM attacks?

Options:
A.

Ettercap

B.

Cain

C.

Dsniff

D.

AirJack

Questions 47

If a password is seven characters or less, the second half of the LM hash is always

___________________.

Options:
A.

0xAAD3B4EE

B.

0xAAD3B4FF

C.

0xAAD3B435B51404FF

D.

0xAAD3B435B51404EE

Questions 48

Which of the following tools allows you to download World Wide Web sites from the Internet to a local computer?

Options:
A.

Netstat

B.

Netcraft

C.

HTTrack

D.

Cheops-ng

Questions 49

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:
A.

Basic authentication

B.

Digest authentication

C.

NTLM authentication

D.

Microsoft Passport authentication

Questions 50

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Options:
A.

Void11

B.

Airsnort

C.

Kismet

D.

Aeropeek