Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following types of Penetration testing provides the testers with complete knowledge of the infrastructure to be tested?

Options:

A.

White Box


B.

Black Box


C.

Grey Box


D.

Water Fall


Expert Solution
Questions # 42:

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

Options:

A.

Artistic license


B.

Spam


C.

Patent


D.

Phishing


Expert Solution
Questions # 43:

Which of the following Web authentication techniques uses a single sign-on scheme?

Options:

A.

Basic authentication


B.

Digest authentication


C.

NTLM authentication


D.

Microsoft Passport authentication


Expert Solution
Questions # 44:

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Options:

A.

Void11


B.

Airsnort


C.

Kismet


D.

Aeropeek


Expert Solution
Questions # 45:

Which of the following is NOT an example of passive footprinting?

Options:

A.

Scanning ports.


B.

Analyzing job requirements.


C.

Querying the search engine.


D.

Performing the whois query.


Expert Solution
Questions # 46:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Question # 46

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Cain


B.

Kismet


C.

AirSnort


D.

PsPasswd


Expert Solution
Questions # 47:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

Gathering information

Determining the network range

Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Options:

A.

APNIC


B.

SuperScan


C.

ARIN


D.

RIPE


Expert Solution
Questions # 48:

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

Options:

A.

Adam is using NTFS file system.


B.

Alternate Data Streams is a feature of Linux operating system.


C.

Adam is using FAT file system.


D.

Adam's system runs on Microsoft Windows 98 operating system.


Expert Solution
Questions # 49:

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Cross-site scripting


B.

Session sidejacking


C.

ARP spoofing


D.

Session fixation


Expert Solution
Questions # 50:

Which of the following tools is not a BlueSnarf attacking tool?

Options:

A.

Blooover


B.

Redsnarf


C.

BlueSnarfer


D.

Freejack


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions