Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

If a password is seven characters or less, the second half of the LM hash is always

___________________.

Options:

A.

0xAAD3B4EE


B.

0xAAD3B4FF


C.

0xAAD3B435B51404FF


D.

0xAAD3B435B51404EE


Expert Solution
Questions # 52:

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

Options:

A.

intitle:index.of inbox dbx


B.

intext:"outlook.asp"


C.

allinurl:"exchange/logon.asp"


D.

intitle:"Index Of" -inurl:maillog maillog size


Expert Solution
Questions # 53:

Which of the following is NOT a valid DNS zone type?

Options:

A.

Stub zone


B.

Secondary zone


C.

AlterNet zone


D.

Primary zone


Expert Solution
Questions # 54:

You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?

Options:

A.

Sam spade


B.

Nmap


C.

Whois


D.

Google


Expert Solution
Questions # 55:

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strongest security level


B.

Dynamic key encryption


C.

Password hash for client authentication


D.

Public key certificate for server authentication


Expert Solution
Questions # 56:

Which of the following syntaxes is the correct syntax for the master.dbo.sp_makewebtask procedure?

Options:

A.

sp_makewebtask [@inputfile =] 'inputfile', [@query =] 'query'


B.

sp_makewebtask [@outputfile =] 'outputfile', [@query =] 'query'


C.

sp_makewebtask [@query =] 'query', [@inputfile =] 'inputfile'


D.

sp_makewebtask [@query =] 'query', [@outputfile =] 'outputfile'


Expert Solution
Questions # 57:

How many bits encryption does SHA-1 use?

Options:

A.

128


B.

140


C.

512


D.

160


Expert Solution
Questions # 58:

Which of the following tasks is NOT performed by antiviruses?

Options:

A.

Activity blocking


B.

Heuristic scanning


C.

Integrity scanning


D.

Session hijacking


Expert Solution
Questions # 59:

Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?

Options:

A.

HTTPS


B.

SSL


C.

LDAP


D.

TLS


Expert Solution
Questions # 60:

You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?

Options:

A.

Cain and Abel


B.

Brutus


C.

Dsniff


D.

Nmap


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions