Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following techniques is used to monitor telephonic and Internet conversations by a third party?

Options:
A.

War driving

B.

War dialing

C.

Web ripping

D.

Wiretapping

GIAC GPEN Premium Access
Questions 52

What does TCSEC stand for?

Options:
A.

Trusted Computer System Evaluation Criteria

B.

Target Computer System Evaluation Criteria

C.

Trusted Computer System Experiment Criteria

D.

Trusted Computer System Evaluation Center

Questions 53

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

Options:
A.

Insertion

B.

Evasion

C.

Fragmentation overwrite

D.

Fragmentation overlap

Questions 54

Which of the following tools is used for SNMP enumeration?

Options:
A.

SARA

B.

Userinfo

C.

Getif

D.

Enum

Questions 55

Which of the following tasks is NOT performed into the enumeration phase?

Options:
A.

Discovering NetBIOS names

B.

Obtaining Active Directory information and identifying vulnerable user accounts

C.

Injecting a backdoor to the remote computer to gain access in it remotely

D.

Establishing NULL sessions and queries

Questions 56

Which of the following tools is based on the SATAN tool?

Options:
A.

Retina

B.

Internet scanner

C.

GFI LANguard

D.

SAINT

Questions 57

Which of the following statements about Fport is true?

Options:
A.

It works as a process viewer.

B.

It works as a datapipe on Windows.

C.

It works as a datapipe on Linux.

D.

It is a source port forwarder/redirector.

Questions 58

Which of the following nmap switches is used to perform ICMP netmask scanning?

Options:
A.

-PM

B.

-PB

C.

-PI

D.

-PS

Questions 59

You have been contracted to perform a black box pen test against the Internet facing servers for a company. They want to know, with a high level of confidence, if their servers are vulnerable to external attacks. Your contract states that you can use all tools available to you to pen test the systems. What course of action would you use to generate a report with the lowest false positive rate?

Options:
A.

Use a port scanner to find open service ports and generate a report listing allvulnerabilities associated with those listening services.

B.

Use a vulnerability or port scanner to find listening services and then try to exploitthose services.

C.

Use a vulnerability scanner to generate a report of vulnerable services.

D.

Log into the system and record the patch levels of each service then generate areport that lists known vulnerabilities for all the running services.

Questions 60

Which of the following best explains why you would warn to clear browser slate (history. cache, and cookies) between examinations of web servers when you've been trapping and altering values with a non-transparent proxy?

Options:
A.

Values trapped and stored in the browser will reveal the techniques you've used toexamine the web servers.

B.

Trapping and changing response values is beneficial for web site testing but usingthe same cached values in your browser will prevent you from being able to changethose values.

C.

Trapping and changing response values is beneficial for web site testing but willcause browser instability if not cleared.

D.

Values trapped and changed in the proxy, such as a cookie, will be stored by thebrowser and may impact further testing.