Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is the main difference between LAN MAN and NTLMv1 challenge/responses?

Options:

A.

NTLMv1 only pads IS bytes, whereas LANMAN pads to 21 bytes


B.

NTLMv1 starts with the NT hash, whereas LANMAN starts with the LANMAN hash


C.

NTLMv1utilizes DES, whereas LANMAN utilizes MD4


D.

NTLMv1 splits the hash into 3 eight-byte pieces, whereas LAN MAN splits the hash Into 3 seven-byte pieces


Expert Solution
Questions # 12:

A penetration tester used a client-side browser exploit from metasploit to get an unprivileged shell prompt on the target Windows desktop. The penetration tester then tried using the getsystem command to perform a local privilege escalation which failed. Which of the following could resolve the problem?

Options:

A.

Load priv module and try getsystem again


B.

Run getuid command, then getpriv command, and try getsystem again


C.

Run getuid command and try getsystem again


D.

Use getprivs command instead of getsystem


Expert Solution
Questions # 13:

When sniffing wireless frames, the interface mode plays a key role in successfully collecting traffic. Which of the mode or modes are best used for sniffing wireless traffic?

Options:

A.

Master Ad-hoc


B.

RFMON


C.

RFMON. Ad-hoc


D.

Ad-hoc


Expert Solution
Questions # 14:

Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?

Options:

A.

One-way, the client challenges the access point


B.

One-way, the access point challenges the client


C.

No challenges occur (or wireless connection


D.

Two-way, both the client and the access point challenge each other


Expert Solution
Questions # 15:

Your company has decided that the risk of performing a penetration test Is too great. You would like to figure out other ways to find vulnerabilities on their systems, which of the following is MOST likely to be a valid alternative?

Options:

A.

Network scope Analysis


B.

Baseline Data Reviews


C.

Patch Policy Review


D.

Configuration Reviews


Expert Solution
Questions # 16:

Which of the following best describes a client side exploit?

Options:

A.

Attack of a client application that retrieves content from the network


B.

Attack that escalates user privileged to root or administrator


C.

Attack of a service listening on a client system


D.

Attack on the physical machine


Expert Solution
Questions # 17:

You have been contracted to penetration test an e-mail server for a client that wants to know for sure if the sendmail service is vulnerable to any known attacks. You have permission to run any type of test, how will you proceed to give the client the most valid answer?

Options:

A.

Run all known sendmail exploits against the server and see if you can compromisethe service, even if it crashed the machine or service


B.

Run a banner grabbing vulnerability checker to determine the sendmail version andpatch level, then look up and report all the vulnerabilities that exist for that versionand patch level


C.

Run all sendmail exploits that will not crash the server and see if you cancompromise the service


D.

Log into the e-mail and determine the sendmail version and patch level, then lookup and report all the vulnerabilities that exist for that version and patch level


Expert Solution
Questions # 18:

You are conducting a penetration test for a private company located in Canada. The scope extends to all internal-facing hosts controlled by the company. You have gathered necessary hold-harmless and non-disclosure agreements. Which action by your group can incur criminal liability under Criminal Code of Canada Sections 184 and 542 CC 184?

Options:

A.

Analyzing internal firewall router software for vulnerabilities


B.

Exploiting application vulnerabilities on end-user workstations


C.

Attempting to crack passwords on a development server


D.

Capturing a VoIP call to a third party without prior notice


Expert Solution
Questions # 19:

Which of the following is a method of gathering user names from a Linux system?

Options:

A.

Displaying the owner information of system-specific binaries


B.

Reviewing the contents of the system log files


C.

Gathering listening services from the xinetd configuration files


D.

Extracting text strings from the system password file


Expert Solution
Questions # 20:

As pan or a penetration lest, your team is tasked with discovering vulnerabilities that could be exploited from an inside threat vector. Which of the following activities fall within that scope?

Options:

A.

SQL injection attacks against the hr intranet website.


B.

A competitor's employee's scanning the company's website.


C.

Wireless "war driving" the company manufacturing site.


D.

Running a Nessus scan from the sales department network.


E.

B, C, and D


F.

A, B. and D


G.

B and D


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions