2013年11月27日星期三

GPEN examination of the latest GIAC certification exam questions and answers

In ITCertKing's website you can free download study guide, some exercises and answers about GIAC certification GPEN exam as an attempt.

Whole ITCertKing's pertinence exercises about GIAC certification GPEN exam is very popular. ITCertKing's training materials can not only let you obtain IT expertise knowledge and a lot of related experience, but also make you be well prepared for the exam. Although GIAC certification GPEN exam is difficult, through doing ITCertKing's exercises you will be very confident for the exam. Be assured to choose ITCertKing efficient exercises right now, and you will do a full preparation for GIAC certification GPEN exam.

About GIAC GPEN exam, each candidate is very confused. Everyone has their own different ideas. But the same idea is that this is a very difficult exam. We are all aware of GIAC GPEN exam is a difficult exam. But as long as we believe ITCertKing, this will not be a problem. ITCertKing's GIAC GPEN exam training materials is an essential product for each candidate. It is tailor-made for the candidates who will participate in the exam. You will absolutely pass the exam. If you do not believe, then take a look into the website of ITCertKing. You will be surprised, because its daily purchase rate is the highest. Do not miss it, and add to your shoppingcart quickly.

ITCertKing has a huge IT industry elite team. They all have high authority in the IT area. They use professional knowledge and experience to provide training materials for people ready to participate in different IT certification exams. The accuracy rate of exam practice questions and answers provided by ITCertKing is very high and they can 100% guarantee you pass the exam successfully for one time. Besides, we will provide you a free one-year update service.

If you want to achieve maximum results with minimum effort in a short period of time, and want to pass the GIAC GPEN exam. You can use ITCertKing's GIAC GPEN exam training materials. The training materials of ITCertKing are the product that through the test of practice. Many candidates proved it does 100% pass the exam. With it, you will reach your goal, and can get the best results.

Exam Code: GPEN
Exam Name: GIAC (GIAC Certified Penetration Tester)
One year free update, No help, Full refund!
Total Q&A: 384 Questions and Answers
Last Update: 2013-11-27

GPEN Free Demo Download: http://www.itcertking.com/GPEN_exam.html

NO.1 Adam works on a Linux system. He is using Sendmail as the primary application to transmit
emails.
Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log
files contains e-mail information such as source and destination IP addresses, date and time stamps
etc?
A. /log/var/logd
B. /var/log/logmail
C. /log/var/mailog
D. /var/log/mailog
Answer: D

GIAC   GPEN study guide   GPEN

NO.2 Which of the following statements are true about KisMAC?
A. Data generated by KisMAC can also be saved in pcap format.
B. It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.
C. It scans for networks passively on supported cards.
D. It is a wireless network discovery tool for Mac OS X.
Answer: A,C,D

GIAC exam prep   GPEN   GPEN practice test   GPEN   GPEN answers real questions

NO.3 You work as a professional Ethical Hacker. You are assigned a project to perform blackhat
testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition
mechanic. You claim that someone from the office called you saying that there is some fault in the
air-conditioner of the server room. After some inquiries/arguments, the Security Administrator
allows you to repair the air-conditioner of the server room.
When you get into the room, you found the server is Linux-based. You press the reboot button of
the server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly
boots backup into Knoppix. You mount the root partition of the server after replacing the root
password in the /etc/shadow file with a known password hash and salt. Further, you copy the netcat
tool on the server and install its startup files to create a reverse tunnel and move a shell to a remote
server whenever the server is restarted. You simply restart the server, pull out the Knoppix Live CD
from the server, and inform that the air-conditioner is working properly.
After completing this attack process, you create a security auditing report in which you mention
various threats such as social engineering threat, boot from Live CD, etc. and suggest the
countermeasures to stop booting from the external media and retrieving sensitive data. Which of
the following steps have you suggested to stop booting from the external media and retrieving
sensitive data with regard to the above scenario?
Each correct answer represents a complete solution. Choose two.
A. Encrypting disk partitions
B. Using password protected hard drives
C. Placing BIOS password
D. Setting only the root level access for sensitive data
Answer: A,B

GIAC   GPEN test   GPEN exam simulations

NO.4 Which of the following statements are true about WPA?
Each correct answer represents a complete solution. Choose all that apply.
A. WPA-PSK converts the passphrase into a 256-bit key.
B. WPA provides better security than WEP .
C. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireles s client.
D. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.
Answer: A,B,C,D

GIAC demo   GPEN exam simulations   GPEN   GPEN exam prep   GPEN braindump

NO.5 TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to
the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the
attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored
and the port will drop the packet. Which of the following operating systems can be easily identified
with the help of TCP FIN scanning?
A. Solaris
B. Red Hat
C. Windows
D. Knoppix
Answer: C

GIAC demo   GPEN test questions   GPEN certification training   GPEN questions   GPEN

NO.6 Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
A. FindSA
B. SQLDict
C. nmap
D. SQLBF
Answer: A,B,D

GIAC   GPEN   GPEN   GPEN   GPEN original questions

NO.7 Which of the following is NOT an example of passive footprinting?
A. Scanning ports.
B. Analyzing job requirements.
C. Performing the whois query.
D. Querying the search engine.
Answer: A

GIAC   GPEN   GPEN original questions   GPEN test answers

NO.8 You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an
unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by
your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after
noticing the following string in the log file:
(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)
When you find All your 802.11b are belong to us as the payload string, you are convinced about
which tool is being used for the unauthorized access. Which of the following tools have you
ascertained?
A. AirSnort
B. Kismet
C. AiroPeek
D. NetStumbler
Answer: D

GIAC   GPEN   GPEN   GPEN exam prep

NO.9 Which of the following options holds the strongest password?
A. california
B. $#164aviD

没有评论:

发表评论