Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

Which of the following password cracking tools can work on the Unix and Linux environment?

Options:

A.

Brutus


B.

Cain and Abel


C.

Ophcrack


D.

John the Ripper


Expert Solution
Questions # 112:

You are a Web Administrator of Millennium Inc. The company has hosted its Web site within its network. The management wants the company's vendors to be able to connect to the corporate site from their locations through the Internet. As a public network is involved in this process, you are concerned about the security of data transmitted between the vendors and the corporate site.

Which of the following can help you?

Options:

A.

EAP


B.

WEP


C.

Smart card


D.

VPN


Expert Solution
Questions # 113:

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

Options:

A.

The telnet session is being affected by the stateful inspection firewall.


B.

The telnet service of we-are-secure.com has corrupted.


C.

The we-are-secure.com server is using a TCP wrapper.


D.

The we-are-secure.com server is using honeypot.


Expert Solution
Questions # 114:

Which of the following ports must you filter to check null sessions on your network?

Options:

A.

139 and 445


B.

111 and 222


C.

1234 and 300


D.

130 and 200


Expert Solution
Questions # 115:

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Using the longest key supported by hardware.


B.

Using a non-obvious key.


C.

Using a 16 bit SSID.


D.

Changing keys often.


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions