Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:

A.

FTK Imager


B.

FAU


C.

Device Seizure


D.

Galleta


Expert Solution
Questions # 92:

In which of the following scanning methods does an attacker send SYN packets and then a RST packet?

Options:

A.

TCP SYN scan


B.

XMAS scan


C.

IDLE scan


D.

TCP FIN scan


Expert Solution
Questions # 93:

Which of the following commands can be used for port scanning?

Options:

A.

nc -z


B.

nc -t


C.

nc -w


D.

nc –g


Expert Solution
Questions # 94:

Which of the following tools can be used to automate the MITM attack?

Options:

A.

Hotspotter


B.

Airjack


C.

Kismet


D.

IKECrack


Expert Solution
Questions # 95:

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WEP


B.

Implement WPA


C.

Don't broadcast SSID


D.

Implement MAC filtering


Expert Solution
Questions # 96:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

UDP


B.

TCP SYN/ACK


C.

IDLE


D.

RPC


Expert Solution
Questions # 97:

You have changed the RestrictAnonymous registry setting from 0 to 1 on your servers to secure your Windows 2000 system so that any malicious user cannot establish a null session on the server. However, when you test the security using userinfo tool, you got that you can still establish the null session. What may be its reason?

Options:

A.

You cannot disable establishing null sessions.


B.

You need to disable the promiscuous mode of network Ethernet card.


C.

You need to set the RestrictAnonymous key value to 2 instead of 1.


D.

You need to install a firewall.


Expert Solution
Questions # 98:

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Magic Lantern


B.

Obiwan


C.

IPSec VPN


D.

SARA


Expert Solution
Questions # 99:

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Options:

A.

E-mail Spam


B.

E-mail Storm


C.

E-mail spoofing


D.

E-mail bombing


Expert Solution
Questions # 100:

Fill in the blank with the appropriate word.

____is a port scanner that can also be used for the OS detection.


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions