Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the purpose of the following command?

C:\>wmic /node:[target IP] /user:[admin-user]

/password:[password] process call create [command]

Options:

A.

Running a command on a remote Windows machine


B.

Creating a service on a remote Windows machine


C.

Creating an admin account on a remote Windows machine


D.

Listing the running processes on a remote windows machine


Expert Solution
Questions # 2:

You are performing a vulnerability assessment using Nessus and your clients printers begin printing pages of random text and showing error messages. The client is not happy with the situation. What is the best way to proceed?

Options:

A.

Enable the "Skip all primers" option and re-scan


B.

Ensure Safe Checks is enabled in Nessus scan policies


C.

Remove primer IP addresses from your target list


D.

Verify primers are in scope and tell the client In progress scans cannot be stopped


Expert Solution
Questions # 3:

A tester has been contracted to perform a penetration test for a corporate client. The scope of the test is limited to end-user workstations and client programs only. Which of die following actions is allowed in this test?

Options:

A.

Attempting to redirect the internal gateway through ARP poisoning


B.

Activating bot clients and performing a denial-of-service against the gateway.


C.

Sniffing and attempting to crack the Domain Administrators password hash.


D.

Sending a malicious pdf to a user and exploiting a vulnerable Reader version.


Expert Solution
Questions # 4:

Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?

Options:

A.

Vncinject/find.lag


B.

Vncinject/reverse.tcp


C.

Vncinject/reverse-http


D.

Vncinject /bind.tcp


Expert Solution
Questions # 5:

Based on the partial appdefstrig rile listed below, which port scan signature is classified by AMap as harmful?

Question # 5

Options:

A.

smtp


B.

netbios-session


C.

http-trace


D.

ms-remote-desktop-protocol


Expert Solution
Questions # 6:

A pen tester is able to pull credential information from memory on a Windows system. Based on the command and output below, what advantage does this technique give a penetration tester when trying to access another windows system on the network?

Question # 6

Options:

A.

The technique is more effective through perimeter firewalls than otherauthentication attacks.


B.

It allows the tester to escalate the privilege level of the account,


C.

Access to the system can be gained without password guessing or cracking.


D.

Salts are removed from the hashes to allow for faster, offline cracking


Expert Solution
Questions # 7:

You are pen testing a network and have shell access to a machine via Netcat. You try to use ssh to access another machine from the first machine. What is the expected result?

Options:

A.

The ssh connection will succeed If you have root access on the intermediate

machine


B.

The ssh connection will fail


C.

The ssh connection will succeed


D.

The ssh connection will succeed if no password required


Expert Solution
Questions # 8:

Analyze the command output below. What information can the tester infer directly from the Information shown?

Question # 8

Options:

A.

Usernames for the domain tesrdomain.com


B.

Directory indexing is allowed on the web server


C.

Vulnerable versions of Adobe software in use


D.

Naming convention for public documents


Expert Solution
Questions # 9:

ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch at Tokyo and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel they can use?

Options:

A.

4


B.

5


C.

10


D.

2


Expert Solution
Questions # 10:

Analyze the screenshot below. What type of vulnerability is being attacked?

Question # 10

Options:

A.

Windows Server service


B.

Internet Explorer


C.

Windows Powershell


D.

Local Security Authority


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions