Exam Details

  • Exam Code
    :GPEN
  • Exam Name
    :GIAC Certified Penetration Tester
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :385 Q&As
  • Last Updated
    :May 12, 2024

GIAC GIAC Information Security GPEN Questions & Answers

  • Question 21:

    Which of the following ports is used for NetBIOS null sessions?

    A. 130

    B. 139

    C. 143

    D. 131

  • Question 22:

    Which of the following TCSEC classes defines verified protection?

    A. Class B

    B. Class D

    C. Class A

    D. Class C

  • Question 23:

    You want that some of your Web pages should not be crawled. Which one of the following options will you use to accomplish the task?

    A. Use HTML NO Crawl tag in the Web page not to be crawled

    B. Place the name of restricted Web pages in the private.txt file

    C. Place the name of restricted Web pages in the robotes.txt file

    D. Enable the SSL

  • Question 24:

    Which of the following tools can be used to automate the MITM attack?

    A. Hotspotter

    B. Airjack

    C. IKECrack

    D. Kismet

  • Question 25:

    The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol? Each correct answer represents a complete solution. Choose all that apply.

    A. Public key certificate for server authentication

    B. Password hash for client authentication

    C. Strongest security level

    D. Dynamic key encryption

  • Question 26:

    In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

    A. Cross-site scripting

    B. Session sidejacking

    C. ARP spoofing

    D. Session fixation

  • Question 27:

    You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

    A. Remoxec

    B. Hk.exe

    C. PSExec

    D. GetAdmin.exe

  • Question 28:

    In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

    A. Cross-site scripting

    B. Session sidejacking

    C. ARP spoofing

    D. Session fixation

  • Question 29:

    You want to perform an active session hijack against Secure Inc. You have found a target that allows Telnet session. You have also searched an active session due to the high level of traffic on the network. What should you do next?

    A. Use a sniffer to listen network traffic.

    B. Guess the sequence numbers.

    C. Use brutus to crack telnet password.

    D. Use macoff to change MAC address.

  • Question 30:

    Which of the following Web authentication techniques uses a single sign-on scheme?

    A. Basic authentication

    B. Digest authentication

    C. NTLM authentication

    D. Microsoft Passport authentication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPEN exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.