[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 121-130

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GPEN.html

GIAC Penetration Tester

Question No: 121 – (Topic 2)

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

  1. The we-are-secure.com server is using honeypot.

  2. The we-are-secure.com server is using a TCP wrapper.

  3. The telnet service of we-are-secure.com has corrupted.

  4. The telnet session is being affected by the stateful inspection firewall.

Answer: B

Question No: 122 – (Topic 2)

You want to find out what ports a system is listening on. What Is the correct command on a Linux system?

  1. netstat nap

  2. f port/p

  3. tasklist/v

  4. Isof -nao

Answer: A

Reference: http://cbl.abuseat.org/advanced.html

Question No: 123 – (Topic 2)

How many bits encryption does SHA-1 use?

A. 140

B. 512

C. 128

D. 160

Answer: D

Question No: 124 – (Topic 2)

Which of the following is the most common method for an attacker to spoof email?

  1. Back door

  2. Replay attack

  3. Man in the middle attack

  4. Open relay

Answer: D

Question No: 125 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Checkpoint files

  2. cookie files

  3. Temporary files

  4. EDB and STM database files

Answer: A,C,D

Question No: 126 – (Topic 2)

Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?

  1. NetStumbler

  2. Tcpdump

  3. Kismet

  4. Ettercap

Answer: A

Question No: 127 – (Topic 2)

You are sending a file to an FTP server. The file will be broken into several pieces of information packets (segments) and will be sent to the server. The file will again be reassembled and reconstructed once the packets reach the FTP server. Which of the following information should be used to maintain the correct order of information packets during the reconstruction of the file?

  1. Acknowledge number

  2. TTL

  3. Checksum

  4. Sequence number

Answer: D

Question No: 128 – (Topic 2)

Which of the following attacks can be overcome by applying cryptography?

  1. Buffer overflow

  2. Web ripping

  3. DoS

  4. Sniffing

Answer: D

Question No: 129 – (Topic 2)

Which of the following tools can be used to perform Windows password cracking, Windows enumeration, and VoIP session sniffing?

  1. Cain

  2. L0phtcrack

  3. Pass-the-hash toolkit

  4. John the Ripper

Answer: A

Question No: 130 – (Topic 2)

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?

  1. Whishker

  2. Nmap

  3. Nessus

  4. SARA

Answer: C

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE