Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GPEN GIAC Penetration Tester Questions and Answers

Questions 4

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He performs a Teardrop attack on the we-are-secure server and observes that the server crashes. Which of the following is the most likely cause of the server crash?

Options:

A.

The spoofed TCP SYN packet containing the IP address of the target is filled in both the source and destination fields.

B.

The we-are-secure server cannot handle the overlapping data fragments.

C.

The ICMP packet is larger than 65,536 bytes.

D.

Ping requests at the server are too high.

Buy Now
Questions 5

Which of the following tools is not a BlueSnarf attacking tool?

Options:

A.

Blooover

B.

Redsnarf

C.

BlueSnarfer

D.

Freejack

Buy Now
Questions 6

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Options:

A.

Aeropeek

B.

Kismet

C.

Airsnort

D.

Void11

Buy Now
Questions 7

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

Options:

A.

Internet layer

B.

Application layer

C.

Transport Layer

D.

Link layer

Buy Now
Questions 8

Which of the following is the default port value of beast Trojan?

Options:

A.

6666

B.

2222

C.

3333

D.

1111

Buy Now
Questions 9

Which of the following tools is used for SNMP enumeration?

Options:

A.

SARA

B.

Userinfo

C.

Getif

D.

Enum

Buy Now
Questions 10

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He performs a Teardrop attack on the we-are-secure server and observes that the server crashes. Which of the following is the most likely cause of the server crash?

Options:

A.

The spoofed TCP SYN packet containing the IP address of the target is filled in both the source and destination fields.

B.

The we-are-secure server cannot handle the overlapping data fragments.

C.

The ICMP packet is larger than 65,536 bytes.

D.

Ping requests at the server are too high.

Buy Now
Questions 11

Which of the following tools allow you to perform HTTP tunneling?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

BackStealth

B.

HTTPort

C.

Tunneled

D.

Nikto

Buy Now
Questions 12

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Cross-site scripting

B.

Session sidejacking

C.

ARP spoofing

D.

Session fixation

Buy Now
Questions 13

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

Options:

A.

Insertion

B.

Evasion

C.

Fragmentation overwrite

D.

Fragmentation overlap

Buy Now
Questions 14

Which of the following is the correct sequence of packets to perform the 3-way handshake method?

Options:

A.

SYN, ACK, ACK

B.

SYN, ACK, SYN/ACK

C.

SYN, SYN/ACK, ACK

D.

SYN, SYN, ACK

Buy Now
Questions 15

Which of the following tools can be used to find a username from a SID?

Options:

A.

SNMPENUM

B.

SID

C.

SID2User

D.

SIDENUM

Buy Now
Questions 16

Which of the following tools is used for port redirection?

Options:

A.

SubSeven

B.

Fpipe

C.

NetBus

D.

Loki

Buy Now
Questions 17

Which of the following is the correct syntax to create a null session?

Options:

A.

c:\ > net view \\IP_addr\IPC$ " " /u: " "

B.

c:\ > net view \\IPC$\IP_addr " " /u: " "

C.

c:\ > net use \\IP_addr\IPC$ " " /u: " "

D.

c:\ > net use \\IPC$\IP_addr " " /u: " "

Buy Now
Questions 18

Which of the following event logs contains traces of brute force attempts performed by an attacker?

Options:

A.

SysEvent.Evt

B.

WinEvent.Evt

C.

AppEvent.Evt

D.

SecEvent.Evt

Buy Now
Questions 19

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.11b

B.

IEEE 802.5

C.

IEEE 802.3

D.

IEEE 802.4

Buy Now
Questions 20

Which of the following tools can be used to find a username from a SID?

Options:

A.

SNMPENUM

B.

SID

C.

SID2User

D.

SIDENUM

Buy Now
Questions 21

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

Options:

A.

WPA2

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Buy Now
Questions 22

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GPEN Question 22

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

AirSnort

C.

Cain

D.

PsPasswd

Buy Now
Questions 23

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

Options:

A.

Post-attack phase

B.

Attack phase

C.

On-attack phase

D.

Pre-attack phase

Buy Now
Questions 24

John, a novice web user, makes a new E-mail account and keeps his password as " apple " , his favorite fruit. John ' s password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Rule based attack

C.

Hybrid attack

D.

Brute Force attack

Buy Now
Questions 25

Which of the following types of Penetration testing provides the testers with complete knowledge of the infrastructure to be tested?

Options:

A.

White Box

B.

Black Box

C.

Grey Box

D.

Water Fall

Buy Now
Questions 26

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?

Options:

A.

Whishker

B.

Nmap

C.

Nessus

D.

SARA

Buy Now
Questions 27

Which of the following tools can be used to perform Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

Cain

B.

L0phtcrack

C.

Pass-the-hash toolkit

D.

John the Ripper

Buy Now
Questions 28

Which of the following describe the benefits to a pass-the-hash attack over traditional password cracking?

Options:

A.

No triggering of IDS signatures from the attack privileges at the level of theacquired password hash and no corruption of the LSASS process.

B.

No triggering of IDS signatures from the attack, no account lockout and use ofnative windows file and print sharing tools on the compromised system.

C.

No account lockout, privileges at the level of the acquired password hash and useof native windows file and print Sharif tools on the compromised system.

D.

No account lockout, use of native file and print sharing tools on the compromisedsystem and no corruption of the LSASS process.

Buy Now
Questions 29

You are using the Nmap Scripting Engine and want detailed output of the script as it runs. Which option do you include in the command string?

Options:

A.

Nmap --script-output -script-SSH-hostkey.nse 155.65.3.221 -p 22

B.

Nmap --script-trace --script-ssh-hostkey.nse 155.65.3.221 -p 22

C.

Nmap -script-verbose --scrlpr-ssh-hostkey.nse 155.65.3.221 -p 22

D.

Nmap -v --script=ssh-hostkey.nse 155.65.3.221 -p 22

Buy Now
Questions 30

As pan or a penetration lest, your team is tasked with discovering vulnerabilities that could be exploited from an inside threat vector. Which of the following activities fall within that scope?

Options:

A.

SQL injection attacks against the hr intranet website.

B.

A competitor ' s employee ' s scanning the company ' s website.

C.

Wireless " war driving " the company manufacturing site.

D.

Running a Nessus scan from the sales department network.

E.

B, C, and D

F.

A, B. and D

G.

B and D

Buy Now
Questions 31

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Options:

A.

Collecting employees information

B.

Gathering private and public IP addresses

C.

Performing Neotracerouting

D.

Banner grabbing

Buy Now
Questions 32

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TCP session hijacking is when a hacker takes over a TCP session between two machines.

B.

It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

C.

Use of a long random number or string as the session key reduces session hijacking.

D.

It is used to slow the working of victim ' s network resources.

Buy Now
Questions 33

In which of the following scanning methods does an attacker send SYN packets and then a RST packet?

Options:

A.

TCP SYN scan

B.

XMAS scan

C.

IDLE scan

D.

TCP FIN scan

Buy Now
Questions 34

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-aresecure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The site should use CAPTCHA after a specific number of failed login attempts.

B.

The site should restrict the number of login attempts to only three times.

C.

The site should force its users to change their passwords from time to time.

D.

The site should increase the encryption key length of the password.

Buy Now
Questions 35

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker by creating a fake wireless network with high power antenna cause Victor ' s computer to associate with his network to gain access.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

Attacker can use the Ping Flood DoS attack if WZC is used.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Buy Now
Questions 36

Analyze the command output below. Given this information, which is the appropriate next step for the tester?

Starting Nmap4.53 (hnp://insecure.org I at2010-09-30 19:13 EDT interesting ports on 192.163.116.101:

PORT STATE SERVICE

130/tcp filtered cisco-fna

131/tcp filtered cisco-tna

132/tcp filtered cisco-sys

133/tcp filtered statsrv

134/tcp filtered Ingres-net

135/tcp filtered msrpc

136/tcp filtered profile

137/tcp filtered netbios-ns

138/tcp filtered netbios-dgm

139/tcp open netbios-ssn

140/tcp filtered emfis-data

MAC Address: 00:30:1 & :B8:14:8B (Shuttle)

warning: OSS can results may be unreliable because we could not find at least l open and l

closed port

Device type, general purpose

Running: Microsoft Windows XP

OS details: Microsoft Windows XP SP2

Network Distance : 1 hop

Nmap done: I IP address (I host up) scanned in l .263 seconds

Options:

A.

Determine the MAC address of the scanned host.

B.

Send a single SYN packet to port 139/tcp on the host.

C.

Send spoofed packets to attempt to evade any firewall

D.

Request a list of shares from the scanned host.

Buy Now
Questions 37

When sniffing wireless frames, the interface mode plays a key role in successfully collecting traffic. Which of the mode or modes are best used for sniffing wireless traffic?

Options:

A.

Master Ad-hoc

B.

RFMON

C.

RFMON. Ad-hoc

D.

Ad-hoc

Buy Now
Questions 38

Fill in the blank with the appropriate word.

____is a port scanner that can also be used for the OS detection.

Options:

Buy Now
Questions 39

Which type of Cross-Sire Scripting (XSS > vulnerability is hardest for automated testing tools to detect, and for what reason?

Options:

A.

Stored XSS. because it may be located anywhere within static or dynamic sitecontent

B.

Stored XSS. because it depends on emails and instant messaging systems.

C.

Reflected XSS. because It can only be found by analyzing web server responses.

D.

Reflected XSS: because it is difficult to find within large web server logs.

Buy Now
Questions 40

A client has asked for a vulnerability scan on an internal network that does not have internet access. The rules of engagement prohibits any outside connection for the Nessus scanning machine. The customer has asked you to scan for a new critical vulnerability, which was released after the testing started, winch of the following methods of updating the Nessus plugins does not violate the rules of engagement?

Options:

A.

Connect the scanning machine via wireless bridge and download the updateddirectly

B.

Change the routing and connect through an alternative gateway

C.

Proceed with the test and note the limitation of updating the plugins

D.

Download the updates on an alternative machine and manually load on scanningmachine

Buy Now
Questions 41

Where are Netcat ' s own network activity messages, such as when a connection occurs, sent?

Options:

A.

Standard Error

B.

Standard input

C.

Standard Logfile

D.

Standard Output

Buy Now
Questions 42

Analyze the command output below, what action is being performed by the tester?

GPEN Question 42

Options:

A.

Displaying a Windows SAM database

B.

Listing available workgroup services

C.

Discovering valid user accounts

D.

Querying locked out user accounts

Buy Now
Questions 43

You ' ve been asked to test a non-transparent proxy lo make sure it is working. After confirming the browser is correctly pointed at the proxy, you try to browse a web site. The browser indicates it is " loading " but never displays any part the page. Checking the proxy, you see a valid request in the proxy from your browser. Checking the response to the proxy, you see the results displayed in the accompanying screenshot. Which of the following answers is the most likely reason the browser hasn ' t displayed the page yet?

GPEN Question 43

Options:

A.

The proxy is likely hung and must be restarted.

B.

The proxy is configured to trap responses.

C.

The proxy is configured to trap requests.

D.

The site you are trying to reach is currently down.

Buy Now
Questions 44

Which of the following best describes a server side exploit?

Options:

A.

Attack on the physical machine

B.

Attack of a service listening on a network port

C.

Attack that escalates user privilege to root or administrator

D.

Attack of a client application that retrieves content from the network

Buy Now
Questions 45

What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?

Options:

A.

Methodology

B.

Conclusions

C.

Executive Summary

D.

Findings

Buy Now
Questions 46

192.168.116.9 Is an IP address forvvww.scanned-server.com. Why are the results from the two scans, shown below, different?

GPEN Question 46

Options:

A.

John.pot

B.

John conf

C.

John.rec

D.

John.ini

Buy Now
Questions 47

What is the main difference between LAN MAN and NTLMv1 challenge/responses?

Options:

A.

NTLMv1 only pads IS bytes, whereas LANMAN pads to 21 bytes

B.

NTLMv1 starts with the NT hash, whereas LANMAN starts with the LANMAN hash

C.

NTLMv1utilizes DES, whereas LANMAN utilizes MD4

D.

NTLMv1 splits the hash into 3 eight-byte pieces, whereas LAN MAN splits the hash Into 3 seven-byte pieces

Buy Now
Questions 48

Which of the following is a method of gathering user names from a Linux system?

Options:

A.

Displaying the owner information of system-specific binaries

B.

Reviewing the contents of the system log files

C.

Gathering listening services from the xinetd configuration files

D.

Extracting text strings from the system password file

Buy Now
Questions 49

Analyze the excerpt from a packet capture between the hosts 192.168.116.9 and 192.168.116.101. What factual conclusion can the tester draw from this output?

GPEN Question 49

Options:

A.

Port 135 is filtered, port 139 is open.

B.

Pons 135 and 139 are filtered.

C.

Ports 139 and 135 are open.

D.

Port 139 is closed, port 135 is open

Buy Now
Questions 50

What command will correctly reformat the Unix passwordcopy and shadowcopy Tiles for input to John The Ripper?

Options:

A.

/Un shadow passwd copy shadowcopy > johnfile

B.

/Unshadow passwdcopy shadowcopy > johnfile

C.

/Unshadow shadowcopy passwdcopy > john file

D.

/Unshadow passwdcopy shadowcopy > johnfile

Buy Now
Questions 51

Which of the following is a WEP weakness that makes it easy to Inject arbitrary clear text packets onto a WEP network?

Options:

A.

Reversible hashes use for IVs

B.

Cryptographically weak CRC32 checksum

C.

RC4 algorithm

D.

Small key space

Buy Now
Questions 52

Which of the following is possible in some SQL injection vulnerabilities on certain types of databases that affects the underlying server OS?

Options:

A.

Database structure retrieval

B.

Shell command execution

C.

Data manipulation

D.

Data query capabilities

Buy Now
Questions 53

You successfully compromise a target system ' s web application using blind command injection. The command you injected is ping-n 1 192.168.1.200. Assuming your machine is 192.168.1 200, which of the following would you see?

Options:

A.

Ping-n 1 192.168.1 200 on the compromised system

B.

A ' Destination host unreachable ' error message on the compromised system

C.

A packet containing ' Packets: Sent - 1 Received = 1, Loss = 0 (0% loss) on yoursniffer

D.

An ICMP Echo packet on your sniffer containing the source address of the target

Buy Now
Questions 54

A client with 7200 employees in 14 cities (all connected via high speed WAN connections) has suffered a major external security breach via a desktop which cost them more than SI 72.000 and the loss of a high profile client. They ask you to perform a desktop vulnerability assessment to identify everything that needs to be patched. Using Nessus you find tens of thousands of vulnerabilities that need to be patched. In the report you find workstations running several Windows OS versions and service pack levels, anti-virus software from multiple vendors several major browser versions and different versions of Acrobat Reader. Which of the following recommendations should you provide with the report?

Options:

A.

The client should standardize their desktop software

B.

The client should eliminate workstations to reduce workload

C.

The client should hire more people to catch up on patches

D.

The client should perform monthly vulnerability assessments

Buy Now
Questions 55

How many bits encryption does SHA-1 use?

Options:

A.

140

B.

512

C.

128

D.

160

Buy Now
Questions 56

You are conducting a penetration test for a private company located in Canada. The scope extends to all internal-facing hosts controlled by the company. You have gathered necessary hold-harmless and non-disclosure agreements. Which action by your group can incur criminal liability under Criminal Code of Canada Sections 184 and 542 CC 184?

Options:

A.

Analyzing internal firewall router software for vulnerabilities

B.

Exploiting application vulnerabilities on end-user workstations

C.

Attempting to crack passwords on a development server

D.

Capturing a VoIP call to a third party without prior notice

Buy Now
Questions 57

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email you@gmail.com ' and press the submit button. The Web application displays the server error.

What can be the reason of the error?

Options:

A.

The remote server is down.

B.

You have entered any special character in email.

C.

Your internet connection is slow.

D.

Email entered is not valid.

Buy Now
Questions 58

You have gained shell on a Windows host and want to find other machines to pivot to, but the rules of engagement state that you can only use tools that are already available. How could you find other machines on the target network?

Options:

A.

Use the " ping " utility to automatically discover other hosts

B.

Use the " ping " utility in a for loop to sweep the network.

C.

Use the " edit " utility to read the target ' s HOSTS file.

D.

Use the " net share " utility to see who is connected to local shared drives.

Buy Now
Questions 59

You suspect that system administrators In one part of the target organization are turning off their systems during the times when penetration tests are scheduled, what feature could you add to the ' Rules of engagement ' that could help your team test that part of the target organization?

Options:

A.

Un announced test

B.

Tell response personnel the exact lime the test will occur

C.

Test systems after normal business hours

D.

Limit tests to business hours

Buy Now
Questions 60

While reviewing traffic from a tcpdump capture, you notice the following commands being sent from a remote system to one of your web servers:

C:\ > sc winternet.host.com create ncservicebinpath- " c:\tools\ncexe -I -p 2222 -e cmd.exe "

C:\ > sc vJnternet.host.com query ncservice.

What is the intent of the commands?

Options:

A.

The first command creates a backdoor shell as a service. It is being started on TCP2222 using cmd.exe. The second command verifies the service is created and itsstatus.

B.

The first command creates a backdoor shell as a service. It is being started on UDP2222 using cmd.exe. The second command verifies the service is created and itsstatus.

C.

This creates a service called ncservice which is linked to the cmd.exe command andits designed to stop any instance of nc.exe being run. The second command verifiesthe service is created and its status.

D.

The first command verifies the service is created and its status. The secondcommand creates a backdoor shell as a service. It is being started on TCP 2222connected to cmd.exe.

Buy Now
Questions 61

When attempting to crack a password using Rainbow Tables, what is the output of the reduction function?

Options:

A.

A new potential chain

B.

A new potential table

C.

A new potential password

D.

A new potential hash

Buy Now
Questions 62

What is the impact on pre-calculated Rainbow Tables of adding multiple salts to a set of passwords?

Options:

A.

Salts increases the time to crack the original password by increasing the number oftables that must be calculated.

B.

Salts double the total size of a rainbow table database.

C.

Salts can be reversed or removed from encoding quickly to produce unsaltedhashes.

D.

Salts have little effect because they can be calculated on the fly with applicationssuch as Ophcrack.

Buy Now
Questions 63

Which of the following nmap switches is used to perform NULL scan?

Options:

A.

-sN

B.

-sO

C.

-sU

D.

-sP

Buy Now
Questions 64

Which of the following nmap switches is used to perform ICMP netmask scanning?

Options:

A.

-PM

B.

-PB

C.

-PI

D.

-PS

Buy Now
Questions 65

You have been contracted to map me network and try to compromise the servers for a client. Which of the following would be an example of scope creep ' with respect to this penetration testing project?

Options:

A.

Disclosing information forbidden in the NDA

B.

Compromising a server then escalating privileges

C.

Being asked to compromise workstations

D.

Scanning network systems slowly so you are not detected

Buy Now
Questions 66

You want to create a binary log file using tcpdump. Which of the following commands will you use?

Options:

A.

tcpdump -B

B.

tcpdump -dd

C.

tcpdump -w

D.

tcpdump –d

Buy Now
Questions 67

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Windows XP

B.

Mac OS

C.

MINIX 3

D.

Linux

Buy Now
Questions 68

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters = ' or ' ' = ' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.

Use the escapeshellarg() function

B.

Use the session_regenerate_id() function

C.

Use the mysql_real_escape_string() function for escaping input

D.

Use the escapeshellcmd() function

Buy Now
Questions 69

What happens when you scan a broadcast IP address of a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It will show an error in the scanning process.

B.

Scanning of the broadcast IP address cannot be performed.

C.

It may show smurf DoS attack in the network IDS of the victim.

D.

It leads to scanning of all the IP addresses on that subnet at the same time.

Buy Now
Questions 70

What happens when you scan a broadcast IP address of a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It may show smurf DoS attack in the network IDS of the victim.

B.

It leads to scanning of all the IP addresses on that subnet at the same time.

C.

It will show an error in the scanning process.

D.

Scanning of the broadcast IP address cannot be performed.

Buy Now
Questions 71

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:

A.

Man-in-the-middle

B.

ARP spoofing

C.

Port scanning

D.

Session hijacking

Buy Now
Questions 72

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Options:

A.

E-mail spoofing

B.

E-mail Spam

C.

E-mail bombing

D.

E-mail Storm

Buy Now
Questions 73

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters= ' or ' ' = ' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.

Use the session_regenerate_id() function

B.

Use the escapeshellcmd() function

C.

Use the mysql_real_escape_string() function for escaping input

D.

Use the escapeshellarg() function

Buy Now
Questions 74

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Cross-Site Scripting attack

C.

Cross-Site Request Forgery

D.

Code injection attack

Buy Now
Questions 75

ACME corporation has decided to setup wireless (IEEE 802.11) network in it ' s sales branch at Tokyo and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel they can use?

Options:

A.

4

B.

5

C.

10

D.

2

Buy Now
Questions 76

Which of the following statements about Fport is true?

Options:

A.

It works as a process viewer.

B.

It works as a datapipe on Windows.

C.

It works as a datapipe on Linux.

D.

It is a source port forwarder/redirector.

Buy Now
Questions 77

Which of the following tools can be used for session splicing attacks?

Options:

A.

ADMutate

B.

APNIC

C.

Whisker

D.

ARIN

Buy Now
Questions 78

Which of the following tools can be used to automate the MITM attack?

Options:

A.

Hotspotter

B.

Airjack

C.

Kismet

D.

IKECrack

Buy Now
Questions 79

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

ntop

B.

Brutus

C.

nmap

D.

sniffer

Buy Now
Questions 80

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Close port TCP 53.

B.

Change the default community string names.

C.

Upgrade SNMP Version 1 with the latest version.

D.

Install antivirus.

Buy Now
Questions 81

LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always

__________.

Options:

A.

0xBBD3B435B51504FF

B.

0xAAD3B435B51404FF

C.

0xBBC3C435C51504EF

D.

0xAAD3B435B51404EE

Buy Now
Questions 82

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

A3-07-B9-E3-BC-F9

B.

F936.28A1.5BCD.DEFA

C.

1011-0011-1010-1110-1100-0001

D.

132.298.1.23

Buy Now
Questions 83

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

GPEN Question 83

What is the IP address of the sender of this email?

Options:

A.

172.16.10.90

B.

209.191.91.180

C.

141.1.1.1

D.

216.168.54.25

Buy Now
Questions 84

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters = ' or ' ' = ' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.

Options:

A.

Replay attack

B.

Land attack

C.

SQL injection attack

D.

Dictionary attack

Buy Now
Questions 85

Which of the following tools allow you to perform HTTP tunneling?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

BackStealth

B.

Tunneled

C.

Nikto

D.

HTTPort

Buy Now
Questions 86

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the

Linux terminal:chmod 741 secure.c

Considering the above scenario, which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

John is restricting a guest to only write or execute the secure.c file.

B.

John is providing all rights to the owner of the file.

C.

By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

D.

The textual representation of the file access permission of 741 will be -rwxr--rw-.

Buy Now
Questions 87

Which of the following tools uses exploits to break into remote operating systems?

Options:

A.

Nessus

B.

Metasploit framework

C.

Nmap

D.

John the Ripper

Buy Now
Questions 88

You have received a file named new.com in your email as an attachment. When you execute this file in your laptop, you get the following message:

' EICAR-STANDARD-ANTIVIRUS-TEST-FILE! '

When you open the file in Notepad, you get the following string:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

What step will you take as a countermeasure against this attack?

Options:

A.

Do nothing.

B.

Traverse to all of your drives, search new.com files, and delete them.

C.

Clean up your laptop with antivirus.

D.

Immediately shut down your laptop.

Buy Now
Questions 89

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value. What may be the reason?

Options:

A.

The zombie computer is not connected to the we-are-secure.com Web server.

B.

The zombie computer is the system interacting with some other system besides your comp uter.

C.

Hping does not perform idle scanning.

D.

The firewall is blocking the scanning process.

Buy Now
Questions 90

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Buy Now
Questions 91

Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?

Options:

A.

HTTPS

B.

SSL

C.

LDAP

D.

TLS

Buy Now
Questions 92

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cheops

B.

Fport

C.

Elsave

D.

Cheops-ng

Buy Now
Questions 93

Which of the following is a tool for SSH and SSL MITM attacks?

Options:

A.

Ettercap

B.

Cain

C.

Dsniff

D.

AirJack

Buy Now
Questions 94

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server.

The output of the scanning test is as follows:

C:\whisker.pl -h target_IP_address

-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1

mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ( ' Printenv ' vulnerability) in the We_are_secure server. Which of the following statements about ' Printenv ' vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

' Printenv ' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

B.

The countermeasure to ' printenv ' vulnerability is to remove the CGI script.

C.

This vulnerability helps in a cross site scripting attack.

D.

With the help of ' printenv ' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Buy Now
Questions 95

Which of the following Nmap commands is used to perform a UDP port scan?

Options:

A.

nmap -sS

B.

nmap -sY

C.

nmap -sN

D.

nmap –sU

Buy Now
Questions 96

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

Options:

A.

Idle scan

B.

TCP SYN scan

C.

Ping sweep scan

D.

XMAS scan

Buy Now
Questions 97

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

Options:

A.

NetStumbler

B.

Snadboy ' s Revelation

C.

WEPCrack

D.

Kismet

Buy Now
Questions 98

Fill in the blank with the appropriate act name.

The___ act gives consumers the right to ask emailers to stop spamming them.

Options:

Buy Now
Questions 99

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

Options:

A.

The laptop will be able to access the wireless network but the security will be compromised

B.

The WAP will allow the connection with the guest account ' s privileges.

C.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

D.

The laptop will not be able to access the wireless network.

Buy Now
Questions 100

Which of the following vulnerability scanner scans from CGI, IDA, Unicode, and Nimda vulnerabilities?

Options:

A.

Hackbot

B.

SARA

C.

Nessus

D.

Cgichk

Buy Now
Questions 101

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.

Recently, John ' s company has got a project to test the security of a promotional Website

www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

< script > alert( ' Hi, John ' ) < /script >

After pressing the search button, a pop-up box appears on his screen with the text - " Hi, John. "

Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:

A.

XSS attack

B.

Replay attack

C.

Buffer overflow attack

D.

CSRF attack

Buy Now
Questions 102

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He uses a Windows XP operating system to do this. He enters the following command on the command prompt:

c:\tracert www.we-are-secure.com

However, he receives an incomplete traceroute result. What could be the reasons for getting an incomplete result for the tracert command?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A router along the path is overloaded.

B.

John ' s computer is behind a firewall that blocks incoming ICMP error messages.

C.

There is no route to the we-are-secure server.

D.

The we-are-secure server is down and is not connected to the Internet.

Buy Now
Questions 103

You have received a file named new.com in your email as an attachment. When you execute this file in your laptop, you get the following message:

' EICAR-STANDARD-ANTIVIRUS-TEST-FILE! '

When you open the file in Notepad, you get the following string:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

What step will you take as a countermeasure against this attack?

Options:

A.

Immediately shut down your laptop.

B.

Do nothing.

C.

Traverse to all of your drives, search new.com files, and delete them.

D.

Clean up your laptop with antivirus.

Buy Now
Questions 104

Which of the following password cracking tools can work on the Unix and Linux environment?

Options:

A.

Brutus

B.

Cain and Abel

C.

Ophcrack

D.

John the Ripper

Buy Now
Questions 105

Which of the following are the drawbacks of the NTLM Web authentication scheme?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be brute forced easily.

B.

It works only with Microsoft Internet Explorer.

C.

The password is sent in clear text format to the Web server.

D.

The password is sent in hashed format to the Web server.

Buy Now
Questions 106

The employees of EWS Inc. require remote access to the company ' s Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is supported by all manufacturers of wireless LAN hardware and software.

B.

It uses a public key certificate for server authentication.

C.

It uses password hash for client authentication.

D.

It provides a moderate level of security.

Buy Now
Questions 107

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

Options:

A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam ' s system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.

Buy Now
Questions 108

Which of the following techniques are NOT used to perform active OS fingerprinting?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Analyzing email headers

B.

Sniffing and analyzing packets

C.

ICMP error message quoting

D.

Sending FIN packets to open ports on the remote system

Buy Now
Questions 109

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

mysql_escape_string()

B.

session_regenerate_id()

C.

mysql_real_escape_string()

D.

Prepared statement

Buy Now
Questions 110

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

Options:

A.

SYN flood attack

B.

Rainbow attack

C.

Zero Day attack

D.

FMS attack

Buy Now
Questions 111

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

Options:

A.

Closed

B.

Open

C.

Filtered

Buy Now
Questions 112

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Ettercap

B.

Nmap

C.

Netcraft

D.

Ethereal

Buy Now
Questions 113

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

Options:

A.

Stalking Amendment Act (1999)

B.

Malicious Communications Act (1998)

C.

Anti-Cyber-Stalking law (1999)

D.

Stalking by Electronic Communications Act (2001)

Buy Now
Questions 114

GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which of the following cryptographic attacks can be used to break both ciphers?

Options:

A.

Man-in-the-middle attack

B.

Ciphertext only attack

C.

Known plaintext attack

D.

Replay attack

Buy Now
Questions 115

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are

NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Not broadcasting SSID

B.

MAC filtering on the router

C.

Strong password policies on workstations.

D.

Using either WEP or WPA encryption

E.

Hardening the server OS

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Apr 30, 2026
Questions: 385

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GPEN testing engine

PDF (Q&A)

$43.57  $124.49
buy now GPEN pdf