Exam Details

  • Exam Code
    :GPEN
  • Exam Name
    :GIAC Certified Penetration Tester
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :385 Q&As
  • Last Updated
    :May 12, 2024

GIAC GIAC Information Security GPEN Questions & Answers

  • Question 381:

    Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?

    A. Vncinject/find.lag

    B. Vncinject/reverse.tcp

    C. Vncinject/reverse-http

    D. Vncinject /bind.tcp

  • Question 382:

    What is the MOST important document to obtain before beginning any penetration testing?

    A. Project plan

    B. Exceptions document

    C. Project contact list

    D. A written statement of permission

  • Question 383:

    While reviewing traffic from a tcpdump capture, you notice the following commands being sent from a remote system to one of your web servers:

    C:\>sc winternet.host.com create ncservice binpath- "c:\tools\ c.exe -I -p 2222 -e cmd.exe"

    C:\>sc vJnternet.host.com query ncservice.

    What is the intent of the commands?

    A. The first command creates a backdoor shell as a service. It is being started on TCP2222 using cmd.exe. The second command verifies the service is created and itsstatus.

    B. The first command creates a backdoor shell as a service. It is being started on UDP2222 using cmd.exe. The second command verifies the service is created and itsstatus.

    C. This creates a service called ncservice which is linked to the cmd.exe command andits designed to stop any instance of nc.exe being run. The second command verifiesthe service is created and its status.

    D. The first command verifies the service is created and its status. The secondcommand creates a backdoor shell as a service. It is being started on TCP 2222connected to cmd.exe.

  • Question 384:

    Which of the following best describes a client side exploit?

    A. Attack of a client application that retrieves content from the network

    B. Attack that escalates user privileged to root or administrator

    C. Attack of a service listening on a client system

    D. Attack on the physical machine

  • Question 385:

    Which of the following TCP packet sequences are common during a SYN (or half-open) scan?

    A. The source computer sends SYN and the destination computer responds with RST

    B. The source computer sends SYN-ACK and no response Is received from the destination computer

    C. The source computer sends SYN and no response is received from the destination computer

    D. The source computer sends SYN-ACK and the destination computer responds with RST-ACK

    A. A,B and C

    B. A and C

    C. C and D

    D. C and D

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPEN exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.