Pass4itsure > GIAC > GIAC Information Security > GPEN > GPEN Online Practice Questions and Answers

GPEN Online Practice Questions and Answers

Questions 4

Which of the following statements are true about NTLMv1?

Each correct answer represents a complete solution. Choose all that apply.

A. It uses the LANMAN hash of the user's password.

B. It is mostly used when no Active Directory domain exists.

C. It is a challenge-response authentication protocol.

D. It uses the MD5 hash of the user's password.

Buy Now
Questions 5

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

A. Stalking Amendment Act (1999)

B. Malicious Communications Act (1998)

C. Anti-Cyber-Stalking law (1999)

D. Stalking by Electronic Communications Act (2001)

Buy Now
Questions 6

Which of the following tools can be used to automate the MITM attack?

A. Hotspotter

B. Airjack

C. Kismet

D. IKECrack

Buy Now
Questions 7

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

A. Configuration of VPN access

B. Setting up of monitoring on ISA Server

C. Defining ISA Server network configuration

D. Defining how ISA Server would cache Web contents

Buy Now
Questions 8

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

A. Insertion

B. Evasion

C. Fragmentation overwrite D. Fragmentation overlap

Buy Now
Questions 9

Which of the following is a web ripping tool?

A. Netcat

B. NetBus

C. SuperScan

D. Black Widow

Buy Now
Questions 10

Which of the following is a web ripping tool?

A. Netcat

B. NetBus

C. SuperScan

D. Black Widow

Buy Now
Questions 11

Which of the following is an open source Web scanner?

A. Nikto

B. GFI LANguird

C. NetRecon

D. Internet scanner

Buy Now
Questions 12

Which of the following statements about Fport is true?

A. It works as a process viewer.

B. It works as a datapipe on Windows.

C. It works as a datapipe on Linux.

D. It is a source port forwarder/redirector.

Buy Now
Questions 13

Which of the following event logs contains traces of brute force attempts performed by an attacker?

A. SysEvent.Evt

B. WinEvent.Evt

C. AppEvent.Evt

D. SecEvent.Evt

Buy Now
Exam Code: GPEN
Exam Name: GIAC Certified Penetration Tester
Last Update: Apr 30, 2024
Questions: 385
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99