Pass the GIAC Security Administration GPEN Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following statements are true about NTLMv1?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It uses the LANMAN hash of the user's password.


B.

It is mostly used when no Active Directory domain exists.


C.

It is a challenge-response authentication protocol.


D.

It uses the MD5 hash of the user's password.


Expert Solution
Questions # 82:

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Windows XP


B.

Mac OS


C.

MINIX 3


D.

Linux


Expert Solution
Questions # 83:

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

Options:

A.

Implement WEP


B.

Implement MAC filtering


C.

Don't broadcast SSID


D.

Implement WPA


Expert Solution
Questions # 84:

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:

A.

Man-in-the-middle


B.

ARP spoofing


C.

Port scanning


D.

Session hijacking


Expert Solution
Questions # 85:

Which of the following is a tool for SSH and SSL MITM attacks?

Options:

A.

Ettercap


B.

Cain


C.

Dsniff


D.

AirJack


Expert Solution
Questions # 86:

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Options:

A.

E-mail spoofing


B.

E-mail Spam


C.

E-mail bombing


D.

E-mail Storm


Expert Solution
Questions # 87:

Analyze the screenshot below, which of the following sets of results will be retrieved using this search?

Question # 87

Options:

A.

Pages from the domain sans.edu that have external links.


B.

Files of type .php from the domain sans.edu.


C.

Pages that contain the term ext:php and slte.sans.edu.


D.

Files of type .php that redirect to the sans.edu domain.


Expert Solution
Questions # 88:

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint. Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

Options:

A.

nmap -O -p


B.

nmap -sS


C.

nmap -sU -p


D.

nmap –sT


Expert Solution
Questions # 89:

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

Options:

A.

Configuration of VPN access


B.

Setting up of monitoring on ISA Server


C.

Defining ISA Server network configuration


D.

Defining how ISA Server would cache Web contents


Expert Solution
Questions # 90:

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

A3-07-B9-E3-BC-F9


B.

F936.28A1.5BCD.DEFA


C.

1011-0011-1010-1110-1100-0001


D.

132.298.1.23


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions