Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPEN Practice Exam with Questions & Answers | Set: 8

Questions 71

Why is it important to have a cheat sheet reference of database system tables when performing SQL Injection?

Options:
A.

This is where sites typically store sensitive information such as credit card numbers.

B.

These tables contain a list of allowed database applications

C.

The information in these tables will reveal details about the web application's code.

D.

These tables contain metadata that can be queried to gain additional helpful information.

GIAC GPEN Premium Access
Questions 72

Approximately how many packets are usually required to conduct a successful FMS attack onWEP?

Options:
A.

250.000

B.

20.000

C.

10.000,000

D.

l (with a weak IV)

Questions 73

You've been asked to test a non-transparent proxy lo make sure it is working. After confirming the browser is correctly pointed at the proxy, you try to browse a web site. The browser indicates it is "loading" but never displays any part the page. Checking the proxy, you see a valid request in the proxy from your browser. Checking the response to the proxy, you see the results displayed in the accompanying screenshot. Which of the following answers is the most likely reason the browser hasn't displayed the page yet?

GPEN Question 73

Options:
A.

The proxy is likely hung and must be restarted.

B.

The proxy is configured to trap responses.

C.

The proxy is configured to trap requests.

D.

The site you are trying to reach is currently down.

Questions 74

Which Metasploit payload includes simple upload and download functionality for moving files to and from compromised systems?

Options:
A.

DLL inject

B.

Upexec

C.

Meterpreter

D.

Vncinject

Questions 75

What is the purpose of the following command?

C:\>wmic /node:[target IP] /user:[admin-user]

/password:[password] process call create [command]

Options:
A.

Running a command on a remote Windows machine

B.

Creating a service on a remote Windows machine

C.

Creating an admin account on a remote Windows machine

D.

Listing the running processes on a remote windows machine

Questions 76

Which of the following modes describes a wireless interface that is configured to passively grab wireless frames from one wireless channel and pass them to the operating system?

Options:
A.

Monitor Mode

B.

Promiscuous Mode

C.

Managed Mode

D.

Master Mode

Questions 77

When a DNS server transfers its zone file to a remote system, what port does it typically use?

Options:
A.

53/TCP

B.

153/UDP

C.

35/TCP

D.

53/UDP

Questions 78

Which of the following TCP packet sequences are common during a SYN (or half-open) scan?

Options:
A.

The source computer sends SYN and the destination computer responds with RST

B.

The source computer sends SYN-ACK and no response Is received from the destination computer

C.

The source computer sends SYN and no response is received from the destination computer

D.

The source computer sends SYN-ACK and the destination computer responds with RST-ACK

E.

A,B and C

F.

A and C

G.

C and D

Questions 79

A tester has been contracted to perform a penetration test for a corporate client. The scope of the test is limited to end-user workstations and client programs only. Which of die following actions is allowed in this test?

Options:
A.

Attempting to redirect the internal gateway through ARP poisoning

B.

Activating bot clients and performing a denial-of-service against the gateway.

C.

Sniffing and attempting to crack the Domain Administrators password hash.

D.

Sending a malicious pdf to a user and exploiting a vulnerable Reader version.

Questions 80

A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester attempting to accomplish using the following Nmap command?

GPEN Question 80

Options:
A.

Checking operating system version

B.

Running an exploit against the target

C.

Checking configuration

D.

Checking protocol version