Exam Details

  • Exam Code
    :GPEN
  • Exam Name
    :GIAC Certified Penetration Tester
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :385 Q&As
  • Last Updated
    :May 12, 2024

GIAC GIAC Information Security GPEN Questions & Answers

  • Question 41:

    Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

    A. WPA2

    B. WPA-PSK

    C. WEP

    D. WPA-EAP

  • Question 42:

    Which of the following are considered Bluetooth security violations? Each correct answer represents a complete solution. Choose two.

    A. Cross site scripting attack

    B. SQL injection attack

    C. Bluesnarfing

    D. Bluebug attack

    E. Social engineering

  • Question 43:

    How many bits encryption does SHA-1 use?

    A. 128

    B. 140

    C. 512

    D. 160

  • Question 44:

    If a password is seven characters or less, the second half of the LM hash is always ___________________.

    A. 0xAAD3B4EE

    B. 0xAAD3B4FF

    C. 0xAAD3B435B51404FF

    D. 0xAAD3B435B51404EE

  • Question 45:

    What does TCSEC stand for?

    A. Trusted Computer System Evaluation Criteria

    B. Target Computer System Evaluation Criteria

    C. Trusted Computer System Experiment Criteria

    D. Trusted Computer System Evaluation Center

  • Question 46:

    Which of the following tools is used for port redirection?

    A. SubSeven

    B. Fpipe

    C. NetBus

    D. Loki

  • Question 47:

    Which of the following is the default port value of beast Trojan?

    A. 6666

    B. 2222

    C. 3333

    D. 1111

  • Question 48:

    Which of the following Trojans does not use TCP protocol?

    A. Donald Dick

    B. Beast

    C. Back Oriffice

    D. NetBus

  • Question 49:

    In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

    A. Insertion

    B. Evasion

    C. Fragmentation overwrite

    D. Fragmentation overlap

  • Question 50:

    In which layer of the OSI model does a sniffer operate?

    A. Network layer

    B. Session layer

    C. Presentation layer

    D. Data link layer

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPEN exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.