[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 101-110

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GPEN.html

GIAC Penetration Tester

Question No: 101 – (Topic 2)

Which of the following standards is used in wireless local area networks (WLANs)?

  1. IEEE 802.4

  2. IEEE 802.3

  3. IEEE 802.11b

  4. IEEE 802.5

Answer: C

Question No: 102 – (Topic 2)

The employees of EWS Inc. require remote access to the company#39;s Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Each correct answer represents a complete solution. Choose all that apply.

  1. It provides a moderate level of security.

  2. It uses password hash for client authentication.

  3. It uses a public key certificate for server authentication.

  4. It is supported by all manufacturers of wireless LAN hardware and software.

Answer: C,D

Question No: 103 – (Topic 2)

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

  1. Site surveys

  2. Protocol analyzers

  3. Network anti-spyware software

  4. Network anti-virus software

Answer: A

Question No: 104 – (Topic 2)

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

  1. Command injection attack

  2. Cross-Site Scripting attack

  3. Cross-Site Request Forgery

  4. Code injection attack

Answer: D

Question No: 105 – (Topic 2)

You work as a Network Administrator in the Secure Inc. You often need to send PDF documents that contain secret information, such as, client password, their credit card details, email passwords, etc. through email to your customers. However, you are making PDFs password protected you are getting complaints from customers that their secret information is being misused. When you analyze this complaint you get that however you are applying the passwords on PDFs, they are not providing the maximum protection. What may be the cause of this security hole?

  1. PDFs can be read easily in the plain-text form by applying a sniffer.

  2. PDFs are sent in email in the plain-text form.

  3. PDF passwords can easily be cracked by brute force attacks.

  4. You are applying easily guessed passwords.

Answer: C

Question No: 106 – (Topic 2)

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

  1. WEP

  2. VPN

  3. Intranet

  4. Extranet

Answer: C

Question No: 107 – (Topic 2)

Which of the following is a passive information gathering tool?

  1. Whois

  2. Snort

  3. Ettercap

  4. Nmap

Answer: A

Question No: 108 – (Topic 2)

Which of the following tools is used to verify the network structure packets and confirm that the packets are constructed according to specification?

  1. snort_inline

  2. EtherApe

  3. Snort decoder

  4. AirSnort

Answer: C

Question No: 109 – (Topic 2)

Which of the following is a tool for SSH and SSL MITM attacks?

  1. Ettercap

  2. Cain

  3. Dsniff

  4. AirJack

Answer: C

Question No: 110 – (Topic 2)

Which of the following tools allow you to perform HTTP tunneling?

Each correct answer represents a complete solution. Choose all that apply.

  1. BackStealth

  2. Tunneled

  3. Nikto

  4. HTTPort

Answer: A,B,D

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE