Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Options:

A.

IDS


B.

Firewall


C.

Snort


D.

WIPS


Expert Solution
Questions # 62:

You want to find out what ports a system is listening on. What Is the correct command on a Linux system?

Options:

A.

netstat nap


B.

f port/p


C.

tasklist/v


D.

Isof -nao


Expert Solution
Questions # 63:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the

Linux terminal:chmod 741 secure.c

Considering the above scenario, which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

John is restricting a guest to only write or execute the secure.c file.


B.

John is providing all rights to the owner of the file.


C.

By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.


D.

The textual representation of the file access permission of 741 will be -rwxr--rw-.


Expert Solution
Questions # 64:

You work as a Network Administrator in the Secure Inc. You often need to send PDF documents that contain secret information, such as, client password, their credit card details, email passwords, etc. through email to your customers. However, you are making PDFs password protected you are getting complaints from customers that their secret information is being misused. When you analyze this complaint you get that however you are applying the passwords on PDFs, they are not providing the maximum protection. What may be the cause of this security hole?

Options:

A.

PDFs can be read easily in the plain-text form by applying a sniffer.


B.

PDFs are sent in email in the plain-text form.


C.

PDF passwords can easily be cracked by brute force attacks.


D.

You are applying easily guessed passwords.


Expert Solution
Questions # 65:

What is the sequence in which packets are sent when establishing a connection to a secured network?

Options:

A.

Auth, Associate and Probe


B.

Probe, Auth and Associate


C.

Associate, Probe and Auth


D.

Probe. Associate and Auth


Expert Solution
Questions # 66:

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

Options:

A.

The we-are-secure.com server is using honeypot.


B.

The we-are-secure.com server is using a TCP wrapper.


C.

The telnet service of we-are-secure.com has corrupted.


D.

The telnet session is being affected by the stateful inspection firewall.


Expert Solution
Questions # 67:

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of the Bluehill Inc. For this, you start monitoring the network traffic of the Bluehill Inc.

In this process, you get that there are too many FTP packets traveling in the Bluehill Inc. network.

Now, you want to sniff the traffic and extract usernames and passwords of the FTP server. Which of the following tools will you use to accomplish the task?

Options:

A.

Ettercap


B.

L0phtcrack


C.

NetStumbler


D.

SARA


Expert Solution
Questions # 68:

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4


B.

IEEE 802.3


C.

IEEE 802.11b


D.

IEEE 802.5


Expert Solution
Questions # 69:

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

Options:

A.

Post-attack phase


B.

Attack phase


C.

Pre-attack phase


D.

On-attack phase


Expert Solution
Questions # 70:

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

Absinthe


B.

THC-Scan


C.

NetStumbler


D.

Kismet


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions