GIAC Penetration Tester
Question No: 201 – (Topic 3)
You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following
NOT steps in securing your wireless connection?
Each correct answer represents a complete solution. Choose two.
Not broadcasting SSID
MAC filtering on the router
Strong password policies on workstations.
Using either WEP or WPA encryption
Hardening the server OS
Question No: 202 – (Topic 3)
Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.
A. 18 U.S.C. 1030
B. 18 U.S.C. 1028
C. 18 U.S.C. 2510
D. 18 U.S.C. 1029
Question No: 203 – (Topic 3)
Which of the following commands can be used for port scanning?
Question No: 204 – (Topic 3)
You have received a file named new.com in your email as an attachment. When you execute this file in your laptop, you get the following message:
When you open the file in Notepad, you get the following string: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H H*
What step will you take as a countermeasure against this attack?
Immediately shut down your laptop.
Traverse to all of your drives, search new.com files, and delete them.
Clean up your laptop with antivirus.
Question No: 205 – (Topic 3)
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following: What ports are open on our network systems.
What hosts are available on the network. Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering. What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use. Which of the following tools is Victor using?
Question No: 206 – (Topic 3)
John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.
For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?
ICMP ping flood tool
Question No: 207 – (Topic 3)
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
Question No: 208 – (Topic 3)
John works as a professional Ethical Hacker. He has been assigned the project of testing
the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:
Information gathering Determination of network range Identification of active systems
Location of open ports and applications
Now, which of the following tasks should he perform next?
Perform OS fingerprinting on the We-are-secure network.
Map the network of We-are-secure Inc.
Fingerprint the services running on the we-are-secure network.
Install a backdoor to log in remotely on the We-are-secure server.
Question No: 209 – (Topic 3)
Which of the following methods can be used to detect session hijacking attack?
Question No: 210 CORRECT TEXT – (Topic 3)
Fill in the blank with the appropriate word.
is a port scanner that can also be used for the OS detection.
100% Free Download!
–Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
–Download 2017 CollectDumps GPEN Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|