Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the purpose of the following command?

C:\>wmic /node:[target IP] /user:[admin-user]

/password:[password] process call create [command]

Options:

A.

Running a command on a remote Windows machine


B.

Creating a service on a remote Windows machine


C.

Creating an admin account on a remote Windows machine


D.

Listing the running processes on a remote windows machine


Questions # 2:

You are performing a vulnerability assessment using Nessus and your clients printers begin printing pages of random text and showing error messages. The client is not happy with the situation. What is the best way to proceed?

Options:

A.

Enable the "Skip all primers" option and re-scan


B.

Ensure Safe Checks is enabled in Nessus scan policies


C.

Remove primer IP addresses from your target list


D.

Verify primers are in scope and tell the client In progress scans cannot be stopped


Questions # 3:

A tester has been contracted to perform a penetration test for a corporate client. The scope of the test is limited to end-user workstations and client programs only. Which of die following actions is allowed in this test?

Options:

A.

Attempting to redirect the internal gateway through ARP poisoning


B.

Activating bot clients and performing a denial-of-service against the gateway.


C.

Sniffing and attempting to crack the Domain Administrators password hash.


D.

Sending a malicious pdf to a user and exploiting a vulnerable Reader version.


Questions # 4:

Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?

Options:

A.

Vncinject/find.lag


B.

Vncinject/reverse.tcp


C.

Vncinject/reverse-http


D.

Vncinject /bind.tcp


Questions # 5:

Based on the partial appdefstrig rile listed below, which port scan signature is classified by AMap as harmful?

Question # 5

Options:

A.

smtp


B.

netbios-session


C.

http-trace


D.

ms-remote-desktop-protocol


Questions # 6:

A pen tester is able to pull credential information from memory on a Windows system. Based on the command and output below, what advantage does this technique give a penetration tester when trying to access another windows system on the network?

Question # 6

Options:

A.

The technique is more effective through perimeter firewalls than otherauthentication attacks.


B.

It allows the tester to escalate the privilege level of the account,


C.

Access to the system can be gained without password guessing or cracking.


D.

Salts are removed from the hashes to allow for faster, offline cracking


Questions # 7:

You are pen testing a network and have shell access to a machine via Netcat. You try to use ssh to access another machine from the first machine. What is the expected result?

Options:

A.

The ssh connection will succeed If you have root access on the intermediate

machine


B.

The ssh connection will fail


C.

The ssh connection will succeed


D.

The ssh connection will succeed if no password required


Questions # 8:

Analyze the command output below. What information can the tester infer directly from the Information shown?

Question # 8

Options:

A.

Usernames for the domain tesrdomain.com


B.

Directory indexing is allowed on the web server


C.

Vulnerable versions of Adobe software in use


D.

Naming convention for public documents


Questions # 9:

ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch at Tokyo and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel they can use?

Options:

A.

4


B.

5


C.

10


D.

2


Questions # 10:

Analyze the screenshot below. What type of vulnerability is being attacked?

Question # 10

Options:

A.

Windows Server service


B.

Internet Explorer


C.

Windows Powershell


D.

Local Security Authority


Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions