GIAC Penetration Tester
Question No: 181 – (Topic 2)
Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?
Question No: 182 – (Topic 2)
Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?
Each correct answer represents a complete solution. Choose two.
Using personal firewall software on your Laptop.
Using a protocol analyzer on your Laptop to monitor for risks.
Using portscanner like nmap in your network.
Using an IPSec enabled VPN for remote connectivity.
Question No: 183 – (Topic 2)
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the
Linux terminal:chmod 741 secure.c
Considering the above scenario, which of the following statements are true? Each correct answer represents a complete solution. Choose all that apply.
John is restricting a guest to only write or execute the secure.c file.
John is providing all rights to the owner of the file.
By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.
The textual representation of the file access permission of 741 will be -rwxr-rw-.
Question No: 184 – (Topic 2)
What will the following scapy commands do?
Perform a SYN-ACK scan against TCP ports 80 and 3080 on host 192.168.1.24.
Perform a SYN scan against ports 80 through 8080 for all hosts on the192.168.1.0/24 network.
Combine the answered and unanswered results of a previous scan into the sr(packet)variable.
Perform a SYN-ACK scan against TCP ports 80 and 8080 for all hosts on the192.16S.1.0/24 network.
Question No: 185 – (Topic 2)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?
Question No: 186 – (Topic 2)
The scope of your engagement is to include a target organization located in California with a /24 block of addresses that they claim to completely own. Which site could you utilize to confirm that you have been given accurate information before starting reconnaissance activities?
Question No: 187 CORRECT TEXT – (Topic 2)
Fill in the blank with the appropriate tool name.
is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.
Question No: 188 – (Topic 2)
You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
Capture data on port 53 and performing banner grabbing.
Capture data on port 53 and delete the remote shell.
Listen the incoming traffic on port 53 and execute the remote shell.
Listen the incoming data and performing port scanning.
Question No: 189 – (Topic 2)
John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters =#39;or#39;#39;=#39; as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?
Use the escapeshellarg() function
Use the session_regenerate_id() function
Use the mysql_real_escape_string() function for escaping input
Use the escapeshellcmd() function
Question No: 190 CORRECT TEXT – (Topic 2)
Fill in the blank with the appropriate act name.
The act gives consumers the right to ask emailers to stop spamming them.
100% Free Download!
–Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
–Download 2017 CollectDumps GPEN Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|