Sunteți pe pagina 1din 8

GIAC

GPEN
Certified Penetration Tester

http://killexams.com/exam-detail/GPEN

DEMO
Find some pages taken from full version

Following pages are for demo purpose only. Demo pages are randomly taken from full version.
Full version can be different from the demo version.
You can request the updated Demo by contacting support@killexams.com.
For Details about Full version Click http://killexams.com/exam-detail/GPEN

Answer: D

QUESTION: 369
Which of the following nmap switches is used to perform ICMP netmask scanning?

A. -PM
B. -PB
C. -PI
D. -PS

Answer: A

QUESTION: 370
Which of the following tasks is NOT performed into the enumeration phase?

A. Discovering NetBIOS names


B. Obtaining Active Directory information and identifying vulnerable user accounts
C. Injecting a backdoor to the remote computer to gain access in it remotely
D. Establishing NULL sessions and queries

Answer: C

QUESTION: 371
Which of the following tools is based on the SATAN tool?

A. Retina
B. Internet scanner
C. GFI LANguard
D. SAINT

Answer: D

QUESTION: 372
Which of the following is an open source Web scanner?

A. Nikto

117

B. GFI LANguird
C. NetRecon
D. Internet scanner

Answer: A

QUESTION: 373
Which of the following statements about Fport is true?

A. It works as a process viewer.


B. It works as a datapipe on Windows.
C. It works as a datapipe on Linux.
D. It is a source port forwarder/redirector.

Answer: A

QUESTION: 374
Which of the following event logs contains traces of brute force attempts performed by an
attacker?

A. SysEvent.Evt
B. WinEvent.Evt
C. AppEvent.Evt
D. SecEvent.Evt

Answer: D

QUESTION: 375
Which of the following ports is used for NetBIOS null sessions?

A. 130
B. 139
C. 143
D. 131

Answer: B

QUESTION: 376

118

Which of the following TCSEC classes defines verified protection?

A. Class B
B. Class D
C. Class A
D. Class C

Answer: C

QUESTION: 377
Which of the following is NOT a Back orifice plug-in?

A. BOSOCK32
B. STCPIO
C. BOPeep
D. Beast

Answer: D

QUESTION: 378
Which of the following is the correct syntax to create a null session?

A. c:\>net view \\IP_addr\IPC$ "" /u: ""


B. c:\>net view \\IPC$\IP_addr "" /u: ""
C. c:\>net use \\IP_addr\IPC$ "" /u: ""
D. c:\>net use \\IPC$\IP_addr "" /u: ""

Answer: C

QUESTION: 379
Which of the following tools is a wireless sniffer and analyzer that works on the Windows
operating system?

A. Aeropeek
B. Kismet
C. Airsnort
D. Void11

119

Answer: A

QUESTION: 380
Which of the following statements about SSID is NOT true?

A. Default settings of SSIDs are secure.


B. All wireless devices on a wireless network must have the same SSID in order to
communicate with each other.
C. It acts as a password for network access.
D. It is used to identify a wireless network.

Answer: A

QUESTION: 381
Which of the following tools is an example of HIDS?

A. Anti-Spector
B. Auditpol.exe
C. Elsave
D. Log File Monitor

Answer: D

QUESTION: 382
Which of the following tools is not a BlueSnarf attacking tool?

A. Blooover
B. Redsnarf
C. BlueSnarfer
D. Freejack

Answer: D

QUESTION: 383
Which of the following tasks is NOT performed by antiviruses?

A. Activity blocking
B. Heuristic scanning

120

C. Integrity scanning
D. Session hijacking

Answer: D

QUESTION: 384
Which of the following does NOT use a proxy software to protect users?

A. Stateful inspection
B. Packet filtering
C. Application layer gateway
D. Circuit level proxy server

Answer: D

121

For More exams visit http://killexams.com

Kill your exam at First Attempt....Guaranteed!

S-ar putea să vă placă și