[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 191-200

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GPEN.html

GIAC Penetration Tester

Question No: 191 – (Topic 2)

You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

A. 512

B. 64 C. 1024 D. 256

Answer: A

Question No: 192 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre- attack phases while testing the security of the server:

Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Each correct answer represents a complete solution. Choose all that apply.

  1. PsFile

  2. PsPasswd

  3. UserInfo

  4. WinSSLMiM

Answer: A,B,C

Question No: 193 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-

based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

  1. The laptop will be able to access the wireless network but the security will be compromised

  2. The WAP will allow the connection with the guest account#39;s privileges.

  3. The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

  4. The laptop will not be able to access the wireless network.

Answer: D

Question No: 194 – (Topic 2)

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

  1. Implement WEP

  2. Implement MAC filtering

  3. Don#39;t broadcast SSID

  4. Implement WPA

Answer: C

Question No: 195 – (Topic 2)

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

  1. Implement WEP.

  2. Disabling SSID broadcast.

  3. Change hub with switch.

  4. Deploying a powerful antenna.

Answer: B

Question No: 196 – (Topic 2)

What happens when you scan a broadcast IP address of a network?

Each correct answer represents a complete solution. Choose all that apply.

  1. It may show smurf DoS attack in the network IDS of the victim.

  2. It leads to scanning of all the IP addresses on that subnet at the same time.

  3. It will show an error in the scanning process.

  4. Scanning of the broadcast IP address cannot be performed.

Answer: A,B

Question No: 197 – (Topic 2)

Which of the following vulnerability scanner scans from CGI, IDA, Unicode, and Nimda vulnerabilities?

  1. Hackbot

  2. SARA

  3. Nessus

  4. Cgichk

Answer: A

Topic 3, Volume C

Question No: 198 – (Topic 3)

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

  1. The telnet session is being affected by the stateful inspection firewall.

  2. The telnet service of we-are-secure.com has corrupted.

  3. The we-are-secure.com server is using a TCP wrapper.

  4. The we-are-secure.com server is using honeypot.

Answer: C

Question No: 199 – (Topic 3)

In which of the following attacking methods does an attacker distribute incorrect IP address?

  1. IP spoofing

  2. Mac flooding

  3. Man-in-the-middle

  4. DNS poisoning

Answer: D

Question No: 200 – (Topic 3)

You enter the following URL on your Web browser:

http://www.we-are-secure.com/scripts/..%co../..%co% af../windows/system32/cmd.exe?/c dir c:\

What task do you want to perform?

  1. Perform buffer overflow attack.

  2. Perform DDoS attack.

  3. View the directory list of c drive.

  4. Perform DoS attack.

Answer: C

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE