DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. GIAC
  3. GIAC Certified Penetration Tester
  4. GIAC.GPEN.v2024-04-20.q363
  5. Question 1

Join the discussion

Question 1/363

Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and 192.168.116.101. What factual conclusion can the tester draw from this output?

Correct Answer: C
Section: Volume A

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (363q)
Q1. Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and 192.168.116....
Q2. You suspect that a firewall or IPS exists between you and the target machine. Which nmap o...
Q3. Which of the following methods can be used to detect session hijacking attack?...
Q4. Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE8...
Q5. You execute the following netcat command: c:\target\nc -1 -p 53 -d -e cmd.exe What action ...
Q6. Which of the following describes the direction of the challenges issued when establishing ...
Q7. As pan or a penetration lest, your team is tasked with discovering vulnerabilities that co...
Q8. Which of the following federal laws are related to hacking activities? Each correct answer...
Q9. Which of the following best describes a client side exploit?...
Q10. Which of the following attacks allows the bypassing of access control lists on servers or ...
Q11. What problem occurs when executing the following command from within a netcat raw shell? s...
Q12. What is the purpose of the following command? C:\>wmic /node:[target IP] /user:[admin-u...
Q13. You successfully compromise a target system's web application using blind command injectio...
Q14. A penetration tester wishes to stop the Windows Firewall process on a remote host running ...
Q15. Analyze the screenshot below. What type of vulnerability is being attacked? (Exhibit)...
Q16. A tester has been contracted to perform a penetration test for a corporate client. The sco...
Q17. Which of the following tools is an automated tool that is used to implement SQL injections...
Q18. You have received a file named new.com in your email as an attachment. When you execute th...
Q19. Which of the following tools allow you to perform HTTP tunneling? Each correct answer repr...
Q20. Which of the following is the feature that separates the use of Rainbow Tables from other ...
Q21. Which of the following tools monitors the radio spectrum for the presence of unauthorized,...
Q22. Which of the following tools can be used by a user to hide his identity? Each correct answ...
Q23. Which of the following is the JavaScript variable used to store a cookie?...
Q24. What happens when you scan a broadcast IP address of a network? Each correct answer repres...
Q25. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
Q26. You work as a Network Administrator in the Secure Inc. You often need to send PDF document...
Q27. Which of the following ports must you filter to check null sessions on your network?...
Q28. Which of the following tools can be used for session splicing attacks?...
Q29. What concept do Rainbow Tables use to speed up password cracking?...
Q30. You want to run the nmap command that includes the host specification of 202.176.56-57.*. ...
Q31. You have connected to a Windows system remotely and have shell access via netcat. While co...
Q32. How can web server logs be leveraged to perform Cross-Site Scripting (XSSI?...
Q33. TCP/IP stack fingerprinting is the passive collection of configuration attributes from a r...
Q34. You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly ...
Q35. If a password is seven characters or less, the second half of the LM hash is always ______...
Q36. Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymi...
Q37. While performing a code audit, you discover a SQL injection vulnerability assuming the fol...
Q38. Which of the following tools allow you to perform HTTP tunneling? Each correct answer repr...
Q39. You suspect that a firewall or IPS exists between you and the target machine. Which nmap o...
Q40. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q41. Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WL...
Q42. You want to retrieve the default security report of nessus. Which of the following google ...
Q43. Which of the following enables an inventor to legally enforce his right to exclude others ...
Q44. Which of the following is a WEP weakness that makes it easy to Inject arbitrary clear text...
Q45. In the screen shot below, which selections would you need click in order to intercept and ...
Q46. SIMULATION Fill in the blank with the appropriate act name. The___ act gives consumers the...
Q47. How many bits encryption does SHA-1 use?
Q48. What is the purpose of the following command? C:\>wmic /node:[target IP] /user:[admin-u...
Q49. In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entir...
Q50. Which of the following tools allows you to download World Wide Web sites from the Internet...
Q51. You have inserted a Trojan on your friend's computer and you want to put it in the startup...
Q52. You successfully compromise a target system's web application using blind command injectio...
Q53. Analyze the command output below. Given this information, which is the appropriate next st...
Q54. You enter the following URL on your Web browser: http://www.we-are-secure.com/scripts/..%c...
Q55. You have connected to a Windows system remotely and have shell access via netcat. While co...
Q56. Which of the following United States laws protects stored electronic information?...
Q57. Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized ar...
Q58. You are using the dsniff tool to intercept communications between two entities and establi...
Q59. You want to perform passive footprinting against we-are-secure Inc. Web server. Which of t...
Q60. You want to connect to your friend's computer and run a Trojan on it. Which of the followi...
Q61. Which of the following tools connects to and executes files on remote systems?...
Q62. John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a ...
Q63. John, a novice web user, makes a new E-mail account and keeps his password as "apple", his...
Q64. You are running a vulnerability scan on a remote network and the traffic Is not making It ...
Q65. You run the rdisk /s command to retrieve the backup SAM file on a computer. Where should y...
Q66. You work as a Network Penetration tester in the Secure Inc. Your company takes the project...
Q67. How does OWASP ZAP function when used for performing web application assessments?...
Q68. You run the rdisk /s command to retrieve the backup SAM file on a computer. Where should y...
Q69. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q70. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q71. You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you...
Q72. Which of the following tools is an example of HIDS?...
Q73. Which of the following tools can be used to perform Windows password cracking, Windows enu...
Q74. You are performing a vulnerability assessment using Nessus and your clients printers begin...
Q75. When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do ...
Q76. Which of the following is the correct sequence of packets to perform the 3-way handshake m...
Q77. Which of the following is generally practiced by the police or any other recognized govern...
Q78. You run the following bash script in Linux: for i in 'cat hostlist.txt' ;do nc -q 2 -v $i ...
Q79. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q80. Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blog...
Q81. Which Metasploitvncinject stager will allow VNC communications from the attacker to a list...
Q82. Which of the following are the two different file formats in which Microsoft Outlook saves...
Q83. You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffi...
Q84. In which of the following scanning techniques does a scanner connect to an FTP server and ...
Q85. Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Pr...
Q86. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
Q87. Which of the following functions can be used as a countermeasure to a Shell Injection atta...
Q88. ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch ...
Q89. Which of the following tools uses exploits to break into remote operating systems?...
Q90. When sniffing wireless frames, the interface mode plays a key role in successfully collect...
Q91. Which of the following best explains why you would warn to clear browser slate (history. c...
Q92. You want to create a binary log file using tcpdump. Which of the following commands will y...
Q93. You want to find out what ports a system is listening on. What Is the correct command on a...
Q94. You are pen testing a Linux target from your windows-based attack platform. You just moved...
Q95. You have gained shell on a Windows host and want to find other machines to pivot to, but t...
Q96. You are concerned about rogue wireless access points being connected to your network. What...
Q97. You want to perform an active session hijack against Secure Inc. You have found a target t...
Q98. You execute the following netcat command: c:\target\nc -1 -p 53 -d -e cmd.exe What action ...
Q99. You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you...
Q100. You want to retrieve password files (stored in the Web server's index directory) from vari...
Q101. TCP/IP stack fingerprinting is the passive collection of configuration attributes from a r...
Q102. TCP/IP stack fingerprinting is the passive collection of configuration attributes from a r...
Q103. You've been asked to test a non-transparent proxy lo make sure it is working. After confir...
Q104. Which of the following security policies will you implement to keep safe your data when yo...
Q105. Which of the following TCP flags shows that the system is forwarding the buffered data?...
Q106. In the screen shot below, which selections would you need click in order to intercept and ...
Q107. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q108. Which of the following Trojans does not use TCP protocol?...
Q109. A pen tester is able to pull credential information from memory on a Windows system. Based...
Q110. You have connected to a Windows system remotely and have shell access via netcat. While co...
Q111. Which of the following types of cyber stalking damage the reputation of their victim and t...
Q112. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q113. You run the following PHP script: <?php $name = mysql_real_escape_string($_POST["name"]...
Q114. Which of the following is generally practiced by the police or any other recognized govern...
Q115. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q116. Which of the following nmap switches is used to perform ICMP netmask scanning?...
Q117. You are running a vulnerability scan on a remote network and the traffic Is not making It ...
Q118. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q119. Which of the following tools is used for the 802.11 HTTP, HTTPS based MITM attacks?...
Q120. You want to connect to your friend's computer and run a Trojan on it. Which of the followi...
Q121. CORRECT TEXT Fill in the blank with the appropriate tool. ____scans IP networks for NetBIO...
Q122. You are pen testing a system and want to use Metasploit 3.X to open a listening port on th...
Q123. What does TCSEC stand for?
Q124. Which of the following are considered Bluetooth security violations? Each correct answer r...
Q125. Which of the following TCP packet sequences are common during a SYN (or half-open) scan? (...
Q126. You send SYN packets with the exact TTL of the target system starting at port 1 and going ...
Q127. What difference would you expect to result from running the following commands; (I). S dig...
Q128. Which of the following attacks allows an attacker to sniff data frames on a local area net...
Q129. Which of the following modes describes a wireless interface that is configured to passivel...
Q130. Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized ar...
Q131. You have been contracted to map me network and try to compromise the servers for a client....
Q132. Which of the following tools is used for vulnerability scanning and calls Hydra to launch ...
Q133. You are conducting a penetration test for a private company located in the UK. The scope e...
Q134. Which Metasploitvncinject stager will allow VNC communications from the attacker to a list...
Q135. Which of the following is the correct syntax to create a null session?...
Q136. A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulne...
Q137. Which of the following password cracking attacks is based on a pre-calculated hash table t...
Q138. You want to perform an active session hijack against Secure Inc. You have found a target t...
Q139. A penetration tester wishes to stop the Windows Firewall process on a remote host running ...
Q140. In which of the following scanning methods do Windows operating systems send only RST pack...
Q141. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q142. SIMULATION Write the appropriate attack name to fill in the blank. In a _____________ DoS ...
Q143. Which of the following tools is spyware that makes Windows clients send their passwords as...
Q144. You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthori...
Q145. What will the following scapy commands do? (Exhibit)...
Q146. You are concerned about war driving bringing hackers attention to your wireless network. W...
Q147. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q148. What does APNIC stand for?
Q149. A client with 7200 employees in 14 cities (all connected via high speed WAN connections) h...
Q150. While performing an assessment on a banking site, you discover the following link: hnps://...
Q151. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q152. Which of the following tools can be used to perform Windows password cracking, Windows enu...
Q153. Which of the following Web authentication techniques uses a single sign-on scheme?...
Q154. Given the following Scapy information, how is default Layer 2 information derived? (Exhibi...
Q155. Which of the following tools is an example of HIDS?...
Q156. Which of the following security protocols can be used to support MS-CHAPv2 for wireless cl...
Q157. Which Metasploit payload includes simple upload and download functionality for moving file...
Q158. Which of the following Nmap commands is used to perform a UDP port scan?...
Q159. Analyze the command output below, what action is being performed by the tester? (Exhibit)...
Q160. Which of the following is a WEP weakness that makes it easy to Inject arbitrary clear text...
Q161. While performing a code audit, you discover a SQL injection vulnerability assuming the fol...
Q162. A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester ...
Q163. Which of the following are the countermeasures against WEP cracking? Each correct answer r...
Q164. Which of the following tools can be used by a user to hide his identity? Each correct answ...
Q165. You suspect that a firewall or IPS exists between you and the target machine. Which nmap o...
Q166. Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized ar...
Q167. When DNS is being used for load balancing, why would a penetration tester choose to identi...
Q168. How many bits encryption does SHA-1 use?
Q169. Where are Netcat's own network activity messages, such as when a connection occurs, sent?...
Q170. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q171. Which of the following statements are true about session hijacking? Each correct answer re...
Q172. You have been contracted to perform a black box pen test against the Internet facing serve...
Q173. You work as a Network Administrator in the Secure Inc. Your company is facing various netw...
Q174. The employees of CCN Inc. require remote access to the company's proxy servers. In order t...
Q175. Which of the following statements about SSID is NOT true?...
Q176. You are conducting a penetration test for a private company located in the UK. The scope e...
Q177. Which of the following types of Penetration testing provides the testers with complete kno...
Q178. You have forgotten your password of an online shop. The web application of that online sho...
Q179. You run the following command on the remote Windows server 2003 computer: c:\reg add HKLM\...
Q180. You suspect that system administrators In one part of the target organization are turning ...
Q181. SIMULATION Fill in the blank with the appropriate tool. ____scans IP networks for NetBIOS ...
Q182. You are done pen testing a Windows system and need to clean up some of the changes you hav...
Q183. All of the following are advantages of using the Metasploitpriv module for dumping hashes ...
Q184. Which of the following file transfer programs will automatically convert end-of line chara...
Q185. Which of the following Web authentication techniques uses a single sign-on scheme?...
Q186. Which of the following functions can you use to mitigate a command injection attack? Each ...
Q187. Which of the following tools uses exploits to break into remote operating systems?...
Q188. Which of the following types of cyber stalking damage the reputation of their victim and t...
Q189. A penetration tester obtains telnet access to a target machine using a captured credential...
Q190. Which of the following statements are true about KisMAC?...
Q191. Which of the following is NOT a valid DNS zone type?...
Q192. You are pen testing a Windows system remotely via a raw netcat shell. You want to get a li...
Q193. Adam is a novice Internet user. He is using Google search engine to search documents of hi...
Q194. Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?...
Q195. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q196. How does OWASP ZAP function when used for performing web application assessments?...
Q197. Which of the following techniques is used to monitor telephonic and Internet conversations...
Q198. You run the following command on the remote Windows server 2003 computer: c:\reg add HKLM\...
Q199. Network mapping provides a security testing team with a blueprint of the organization. Whi...
Q200. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q201. In which of the following attacks is a malicious packet rejected by an IDS, but accepted b...
Q202. Which of the following tools is based on the SATAN tool?...
Q203. Which of the following statements are true about the Enum tool? Each correct answer repres...
Q204. Which of the following tools are used for footprinting? Each correct answer represents a c...
Q205. Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymi...
Q206. You are using the Nmap Scripting Engine and want detailed output of the script as it runs....
Q207. In which of the following attacks does an attacker use packet sniffing to read network tra...
Q208. Your company has decided that the risk of performing a penetration test Is too great. You ...
Q209. Which of the following statements about Fport is true?...
Q210. Which of the following attacks allows an attacker to recover the key in an RC4 encrypted s...
Q211. Analyze the screenshot below. What type of vulnerability is being attacked? (Exhibit)...
Q212. Which of the following wireless security features provides the best wireless security mech...
Q213. Which of the following techniques is used to monitor telephonic and Internet conversations...
Q214. You want to search the Apache Web server having version 2.0 using google hacking. Which of...
Q215. In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entir...
Q216. Based on the partial appdefstrig rile listed below, which port scan signature is classifie...
Q217. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q218. You are conducting a penetration test for a private company located in Canada. The scope e...
Q219. Which of the following penetration testing phases involves gathering data from whois, DNS,...
Q220. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
Q221. You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active...
Q222. 192.168.116.9 Is an IP address forvvww.scanned-server.com. Why are the results from the tw...
Q223. You have received a file named new.com in your email as an attachment. When you execute th...
Q224. What is the main difference between LAN MAN and NTLMv1 challenge/responses?...
Q225. Which of the following is a Windows-based tool that is used for the detection of wireless ...
Q226. If a password is seven characters or less, the second half of the LM hash is always ______...
Q227. Fill in the blank with the appropriate act name. The ____act gives consumers the right to ...
Q228. Which of the following is an open source Web scanner?...
Q229. You are auditing the security of a client company. You find that their password policy onl...
Q230. Which of the following tools is not a BlueSnarf attacking tool?...
Q231. Which of the following statutes is enacted in the U.S., which prohibits creditors from col...
Q232. Every network device contains a unique built in Media Access Control (MAC) address, which ...
Q233. What concept do Rainbow Tables use to speed up password cracking?...
Q234. What is the sequence in which packets are sent when establishing a connection to a secured...
Q235. In which layer of the OSI model does a sniffer operate?...
Q236. Which of the following is a tool for SSH and SSL MITM attacks?...
Q237. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q238. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q239. John works as a Network Security Professional. He is assigned a project to test the securi...
Q240.
Q241. You are concerned about war driving bringing hackers attention to your wireless network. W...
Q242. Adam is a novice Internet user. He is using Google search engine to search documents of hi...
Q243.
Q244. Which of the following tools is spyware that makes Windows clients send their passwords as...
Q245. Which of the following ports is used for NetBIOS null sessions?...
Q246. Which of the following tools can be used to read NetStumbler's collected data files and pr...
Q247. Which of the following attacks is a form of active eavesdropping in which the attacker mak...
Q248. Which of the following can be used to mitigate the evil twin phishing attack?...
Q249. Which of the following wireless security features provides the best wireless security mech...
Q250. What is the most likely cause of the responses on lines 10 and 11 of the output below? (Ex...
Q251. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q252. Which of the following can be used as a countermeasure against the SQL injection attack? E...
Q253. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
Q254. During a penetration test we determine that TCP port 22 is listening on a target host. Kno...
Q255. What will the following scapy commands do? (Exhibit)...
Q256. Which of the following attacks allows the bypassing of access control lists on servers or ...
Q257. Which of the following is possible in some SQL injection vulnerabilities on certain types ...
Q258. Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Pr...
Q259. What is the purpose of die following command: nc.exe -I -p 2222 -e cmd.exe...
Q260. In which of the following security tests does the security testing team simulate as an emp...
Q261. A pen tester is able to pull credential information from memory on a Windows system. Based...
Q262. Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wir...
Q263. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q264. Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 Acti...
Q265. When a DNS server transfers its zone file to a remote system, what port does it typically ...
Q266. What is the MOST important document to obtain before beginning any penetration testing?...
Q267. During a penetration test you discover a valid set of SSH credentials to a remote system. ...
Q268. Which of the following options holds the strongest password?...
Q269. Which of the following is a method of gathering user names from a Linux system?...
Q270. Which of the following Web attacks is performed by manipulating codes of programming langu...
Q271. Network mapping provides a security testing team with a blueprint of the organization. Whi...
Q272. Which of the following programming languages are NOT vulnerable to buffer overflow attacks...
Q273. ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch ...
Q274. You suspect that system administrators In one part of the target organization are turning ...
Q275. When DNS is being used for load balancing, why would a penetration tester choose to identi...
Q276. The employees of CCN Inc. require remote access to the company's proxy servers. In order t...
Q277. Which of the following tools is used to verify the network structure packets and confirm t...
Q278. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q279. Which of the following security protocols can be used to support MS-CHAPv2 for wireless cl...
Q280. In which of the following attacks does the attacker overload the CAM table of the switch?...
Q281. Which of the following is a passive information gathering tool?...
Q282. Which of the following can be used as a countermeasure to the rainbow password attack?...
Q283. Which of the following standards is used in wireless local area networks (WLANs)?...
Q284. An executive in your company reports odd behavior on her PDA. After investigation you disc...
Q285. You work as an IT Technician for uCertify Inc. You have to take security measures for the ...
Q286. In the screen shot below, which selections would you need click in order to intercept and ...
Q287. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q288. You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly ...
Q289. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q290. Which of the following tools monitors the radio spectrum for the presence of unauthorized,...
Q291. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q292. Which of the following is NOT an example of passive footprinting?...
Q293. Which of the following tools are used for footprinting? Each correct answer represents a c...
Q294. Which of the following encryption modes are possible in WEP? Each correct answer represent...
Q295. When sniffing wireless frames, the interface mode plays a key role in successfully collect...
Q296. Which of the following tools is used for port redirection?...
Q297. You are pen testing a network and have shell access to a machine via Netcat. You try to us...
Q298. What difference would you expect to result from running the following commands; (I). S dig...
Q299. The employees of CCN Inc. require remote access to the company's proxy servers. In order t...
Q300. Which of the following can be used as a countermeasure against the SQL injection attack? E...
Q301. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q302. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q303. Which of the following statements are true about the Enum tool? Each correct answer repres...
Q304. Which of the following tools can be used to automate the MITM attack?...
Q305. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q306. Which of the following tools can be used to perform Windows password cracking, Windows enu...
Q307. Which of the following tools is used for the 802.11 HTTP, HTTPS based MITM attacks?...
Q308. Analyze the screenshot below, which of the following sets of results will be retrieved usi...
Q309. Which of the following statements are true about SSIDs? Each correct answer represents a c...
Q310. Which of the following security policies will you implement to keep safe your data when yo...
Q311. Based on the partial appdefstrig rile listed below, which port scan signature is classifie...
Q312. A client has asked for a vulnerability scan on an internal network that does not have inte...
Q313. If the privacy bit is set in the 802.11 header, what does it indicate?...
Q314. Which of the following tools is used for SNMP enumeration?...
Q315. GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which ...
Q316. Which of the following ports must you filter to check null sessions on your network?...
Q317. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
Q318. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q319. Which of the following tools can be used as a Linux vulnerability scanner that is capable ...
Q320. Which of the following tasks is NOT performed into the enumeration phase?...
Q321. What is the most likely cause of the responses on lines 10 and 11 of the output below? (Ex...
Q322. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q323. Which of the following tools is used for SNMP enumeration?...
Q324. Which of the following tasks is NOT performed by antiviruses?...
Q325. What is the maximum limit of the file size that a user can upload according to the code sn...
Q326. You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to invest...
Q327. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q328. You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active...
Q329. Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymi...
Q330. By default Active Directory Controllers store password representations in which file?...
Q331. You want to obtain the Information of a Web server, whose IP address range comes in the IP...
Q332. You want to retrieve the default security report of nessus. Which of the following google ...
Q333. Which type of Cross-Sire Scripting (XSS> vulnerability is hardest for automated testing...
Q334. You have obtained the hash below from the /etc/shadow file. What are you able to discern s...
Q335. You run the following bash script in Linux: for i in 'cat hostlist.txt' ;do nc -q 2 -v $i ...
Q336. Which of the following best describes a client side exploit?...
Q337. Which of the following protocols uses a combination of public key and symmetric encryption...
Q338. Fill in the blank with the appropriate tool. ____scans IP networks for NetBIOS name inform...
Q339. Analyze the output of the two commands below: (Exhibit) Which of the following can be fact...
Q340. You have compromised a Windows workstation using Metasploit and have injected the Meterpre...
Q341. Which of the following can be the countermeasures to prevent NetBIOS NULL session enumerat...
Q342. You work as a Network Security Analyzer. You got a suspicious email while working on a for...
Q343. Which of the following tasks is NOT performed by antiviruses?...
Q344. Fill in the blank with the appropriate word. ____is a port scanner that can also be used f...
Q345. Which of the following tasks can be performed by using netcat utility? Each correct answer...
Q346. You have compromised a Windows XP system and Injected the Meterpreter payload into the lsa...
Q347. Which of the following can be used to perform session hijacking? Each correct answer repre...
Q348. Which of the following tools crashes computers running Windows 2000/XP/NT by sending craft...
Q349. Which of the following Nmap commands is used to perform a UDP port scan?...
Q350. Which of the following can be used as a countermeasure against the SQL injection attack? E...
Q351. Analyze the screenshot below, which of the following sets of results will be retrieved usi...
Q352. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
Q353. One of the sales people in your company complains that sometimes he gets a lot of unsolici...
Q354. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q355. How can web server logs be leveraged to perform Cross-Site Scripting (XSSI?...
Q356. A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulne...
Q357. You have detected what appears to be an unauthorized wireless access point on your network...
Q358. You work as an Administrator for Bluesky Inc. The company has 145 Windows XP Professional ...
Q359. Which of the following is the second half of the LAN manager Hash?...
Q360. Which of the following password cracking tools can work on the Unix and Linux environment?...
Q361. You want to retrieve the default security report of nessus. Which of the following google ...
Q362. John works as an Ethical Hacker for uCertify Inc. He wants to find out the ports that are ...
Q363. In which of the following attacks is a malicious packet rejected by an IDS, but accepted b...
[×]

Download PDF File

Enter your email address to download GIAC.GPEN.v2024-04-20.q363.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.