[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 181-190

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GPEN.html

GIAC Penetration Tester

Question No: 181 – (Topic 2)

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

  1. IDS

  2. Firewall

  3. Snort

  4. WIPS

Answer: D

Question No: 182 – (Topic 2)

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

  1. Using personal firewall software on your Laptop.

  2. Using a protocol analyzer on your Laptop to monitor for risks.

  3. Using portscanner like nmap in your network.

  4. Using an IPSec enabled VPN for remote connectivity.

Answer: A,D

Question No: 183 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the

Linux terminal:chmod 741 secure.c

Considering the above scenario, which of the following statements are true? Each correct answer represents a complete solution. Choose all that apply.

  1. John is restricting a guest to only write or execute the secure.c file.

  2. John is providing all rights to the owner of the file.

  3. By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

  4. The textual representation of the file access permission of 741 will be -rwxr-rw-.

Answer: B,C

Question No: 184 – (Topic 2)

What will the following scapy commands do?

Collectdumps 2017 PDF and VCE

  1. Perform a SYN-ACK scan against TCP ports 80 and 3080 on host 192.168.1.24.

  2. Perform a SYN scan against ports 80 through 8080 for all hosts on the192.168.1.0/24 network.

  3. Combine the answered and unanswered results of a previous scan into the sr(packet)variable.

  4. Perform a SYN-ACK scan against TCP ports 80 and 8080 for all hosts on the192.16S.1.0/24 network.

Answer: D

Question No: 185 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

  1. NetStumbler

  2. Snadboy#39;s Revelation

  3. WEPCrack

  4. Kismet

Answer: D

Question No: 186 – (Topic 2)

The scope of your engagement is to include a target organization located in California with a /24 block of addresses that they claim to completely own. Which site could you utilize to confirm that you have been given accurate information before starting reconnaissance activities?

  1. www.whois.net

  2. www.arin.nei

  3. www.apnic.net

  4. www.ripe.net

Answer: B

Question No: 187 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate tool name.

is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.

Answer: WEPcrack

Question No: 188 – (Topic 2)

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

  1. Capture data on port 53 and performing banner grabbing.

  2. Capture data on port 53 and delete the remote shell.

  3. Listen the incoming traffic on port 53 and execute the remote shell.

  4. Listen the incoming data and performing port scanning.

Answer: C

Question No: 189 – (Topic 2)

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters =#39;or#39;#39;=#39; as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

  1. Use the escapeshellarg() function

  2. Use the session_regenerate_id() function

  3. Use the mysql_real_escape_string() function for escaping input

  4. Use the escapeshellcmd() function

Answer: C

Question No: 190 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate act name.

The act gives consumers the right to ask emailers to stop spamming them.

Answer: CAN-SPAM

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE