Documente Academic
Documente Profesional
Documente Cultură
GPEN
Certified Penetration Tester
http://killexams.com/exam-detail/GPEN
DEMO
Find some pages taken from full version
Following pages are for demo purpose only. Demo pages are randomly taken from full version.
Full version can be different from the demo version.
You can request the updated Demo by contacting support@killexams.com.
For Details about Full version Click http://killexams.com/exam-detail/GPEN
Answer: D
QUESTION: 369
Which of the following nmap switches is used to perform ICMP netmask scanning?
A. -PM
B. -PB
C. -PI
D. -PS
Answer: A
QUESTION: 370
Which of the following tasks is NOT performed into the enumeration phase?
Answer: C
QUESTION: 371
Which of the following tools is based on the SATAN tool?
A. Retina
B. Internet scanner
C. GFI LANguard
D. SAINT
Answer: D
QUESTION: 372
Which of the following is an open source Web scanner?
A. Nikto
117
B. GFI LANguird
C. NetRecon
D. Internet scanner
Answer: A
QUESTION: 373
Which of the following statements about Fport is true?
Answer: A
QUESTION: 374
Which of the following event logs contains traces of brute force attempts performed by an
attacker?
A. SysEvent.Evt
B. WinEvent.Evt
C. AppEvent.Evt
D. SecEvent.Evt
Answer: D
QUESTION: 375
Which of the following ports is used for NetBIOS null sessions?
A. 130
B. 139
C. 143
D. 131
Answer: B
QUESTION: 376
118
A. Class B
B. Class D
C. Class A
D. Class C
Answer: C
QUESTION: 377
Which of the following is NOT a Back orifice plug-in?
A. BOSOCK32
B. STCPIO
C. BOPeep
D. Beast
Answer: D
QUESTION: 378
Which of the following is the correct syntax to create a null session?
Answer: C
QUESTION: 379
Which of the following tools is a wireless sniffer and analyzer that works on the Windows
operating system?
A. Aeropeek
B. Kismet
C. Airsnort
D. Void11
119
Answer: A
QUESTION: 380
Which of the following statements about SSID is NOT true?
Answer: A
QUESTION: 381
Which of the following tools is an example of HIDS?
A. Anti-Spector
B. Auditpol.exe
C. Elsave
D. Log File Monitor
Answer: D
QUESTION: 382
Which of the following tools is not a BlueSnarf attacking tool?
A. Blooover
B. Redsnarf
C. BlueSnarfer
D. Freejack
Answer: D
QUESTION: 383
Which of the following tasks is NOT performed by antiviruses?
A. Activity blocking
B. Heuristic scanning
120
C. Integrity scanning
D. Session hijacking
Answer: D
QUESTION: 384
Which of the following does NOT use a proxy software to protect users?
A. Stateful inspection
B. Packet filtering
C. Application layer gateway
D. Circuit level proxy server
Answer: D
121