[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 201-210

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GPEN.html

GIAC Penetration Tester

Question No: 201 – (Topic 3)

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following

are

NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

  1. Not broadcasting SSID

  2. MAC filtering on the router

  3. Strong password policies on workstations.

  4. Using either WEP or WPA encryption

  5. Hardening the server OS

Answer: C,E

Question No: 202 – (Topic 3)

Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.

A. 18 U.S.C. 1030

B. 18 U.S.C. 1028

C. 18 U.S.C. 2510

D. 18 U.S.C. 1029

Answer: A,C,D

Question No: 203 – (Topic 3)

Which of the following commands can be used for port scanning?

  1. nc -z

  2. nc -t

  3. nc -w

  4. nc -g

Answer: A

Question No: 204 – (Topic 3)

You have received a file named new.com in your email as an attachment. When you execute this file in your laptop, you get the following message:

#39;EICAR-STANDARD-ANTIVIRUS-TEST-FILE!#39;

When you open the file in Notepad, you get the following string: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H H*

What step will you take as a countermeasure against this attack?

  1. Immediately shut down your laptop.

  2. Do nothing.

  3. Traverse to all of your drives, search new.com files, and delete them.

  4. Clean up your laptop with antivirus.

Answer: B

Question No: 205 – (Topic 3)

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following: What ports are open on our network systems.

What hosts are available on the network. Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering. What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use. Which of the following tools is Victor using?

  1. Nmap

  2. Kismet

  3. Sniffer

  4. Nessus

Answer: A

Question No: 206 – (Topic 3)

John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.

For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

  1. ICMP ping flood tool

  2. Kismet

  3. Netstumbler

  4. AirSnort

Answer: A

Question No: 207 – (Topic 3)

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

  1. Ettercap

  2. Nmap

  3. Netcraft

  4. Ethereal

Answer: C

Question No: 208 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing

the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

Information gathering Determination of network range Identification of active systems

Location of open ports and applications

Now, which of the following tasks should he perform next?

  1. Perform OS fingerprinting on the We-are-secure network.

  2. Map the network of We-are-secure Inc.

  3. Fingerprint the services running on the we-are-secure network.

  4. Install a backdoor to log in remotely on the We-are-secure server.

Answer: A

Question No: 209 – (Topic 3)

Which of the following methods can be used to detect session hijacking attack?

  1. ntop

  2. Brutus

  3. nmap

  4. sniffer

Answer: D

Question No: 210 CORRECT TEXT – (Topic 3)

Fill in the blank with the appropriate word.

is a port scanner that can also be used for the OS detection.

Answer: Nmap

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE