Exam Details

  • Exam Code
    :GPEN
  • Exam Name
    :GIAC Certified Penetration Tester
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :385 Q&As
  • Last Updated
    :May 12, 2024

GIAC GIAC Information Security GPEN Questions & Answers

  • Question 11:

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-aresecure network:

    Gathering information Determining the network range Identifying active systems

    Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

    A. APNIC

    B. SuperScan

    C. ARIN

    D. RIPE

  • Question 12:

    Which of the following are the countermeasures against WEP cracking? Each correct answer represents a part of the solution. Choose all that apply.

    A. Using the longest key supported by hardware.

    B. Using a 16 bit SSID.

    C. Changing keys often.

    D. Using a non-obvious key.

  • Question 13:

    Which of the following is the correct sequence of packets to perform the 3-way handshake method?

    A. SYN, ACK, ACK

    B. SYN, ACK, SYN/ACK

    C. SYN, SYN/ACK, ACK

    D. SYN, SYN, ACK

  • Question 14:

    Which of the following is NOT a Back orifice plug-in?

    A. BOSOCK32

    B. STCPIO

    C. BOPeep

    D. Beast

  • Question 15:

    Which of the following nmap switches is used to perform ICMP netmask scanning?

    A. -PM

    B. -PB

    C. -PI

    D. -PS

  • Question 16:

    Which of the following tasks is NOT performed into the enumeration phase?

    A. Discovering NetBIOS names

    B. Obtaining Active Directory information and identifying vulnerable user accounts

    C. Injecting a backdoor to the remote computer to gain access in it remotely

    D. Establishing NULL sessions and queries

  • Question 17:

    Which of the following tools is based on the SATAN tool?

    A. Retina

    B. Internet scanner

    C. GFI LANguard

    D. SAINT

  • Question 18:

    Which of the following is an open source Web scanner?

    A. Nikto

    B. GFI LANguird

    C. NetRecon

    D. Internet scanner

  • Question 19:

    Which of the following statements about Fport is true?

    A. It works as a process viewer.

    B. It works as a datapipe on Windows.

    C. It works as a datapipe on Linux.

    D. It is a source port forwarder/redirector.

  • Question 20:

    Which of the following event logs contains traces of brute force attempts performed by an attacker?

    A. SysEvent.Evt

    B. WinEvent.Evt

    C. AppEvent.Evt

    D. SecEvent.Evt

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPEN exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.