[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 231-240

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GPEN.html

GIAC Penetration Tester

Question No: 231 – (Topic 3)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. You install access points for enabling a wireless network. The sales team members and the managers in the company will be using laptops to connect to the LAN through wireless connections. Therefore, you install WLAN network interface adapters on their laptops. However, you want to restrict the sales team members and managers from communicating directly to each other. Instead, they should communicate through the access points on the network. Which of the following topologies will you use to accomplish the task?

  1. Star

  2. Ad hoc

  3. Infrastructure

  4. Mesh

Answer: C

Question No: 232 – (Topic 3)

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

  1. Application layer

  2. Link layer

  3. Internet layer

  4. Transport Layer

Answer: B

Question No: 233 – (Topic 3)

Which of the following can be used to mitigate the evil twin phishing attack?

  1. Magic Lantern

  2. Obiwan

  3. IPSec VPN

  4. SARA

Answer: C

Question No: 234 – (Topic 3)

You are a Web Administrator of Millennium Inc. The company has hosted its Web site within its network. The management wants the company#39;s vendors to be able to connect to the corporate site from their locations through the Internet. As a public network is involved in this process, you are concerned about the security of data transmitted between the vendors and the corporate site.

Which of the following can help you?

  1. EAP

  2. WEP

  3. Smart card

  4. VPN

Answer: D

Question No: 235 – (Topic 3)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He has to ping 500 computers to find out whether these computers are connected to the server or not. Which of the following will he use to ping these computers?

  1. PING

  2. TRACEROUTE

  3. Ping sweeping

  4. NETSTAT

Answer: C

Question No: 236 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He uses a Windows XP operating system to do this. He enters the following command on the command prompt:

c:\tracert www.we-are-secure.com

However, he receives an incomplete traceroute result. What could be the reasons for getting an incomplete result for the tracert command?

Each correct answer represents a complete solution. Choose all that apply.

  1. A router along the path is overloaded.

  2. John#39;s computer is behind a firewall that blocks incoming ICMP error messages.

  3. There is no route to the we-are-secure server.

  4. The we-are-secure server is down and is not connected to the Internet.

Answer: A,B,C,D

Question No: 237 – (Topic 3)

Which of the following are the countermeasures against WEP cracking? Each correct answer represents a part of the solution. Choose all that apply.

  1. Using the longest key supported by hardware.

  2. Using a non-obvious key.

  3. Using a 16 bit SSID.

  4. Changing keys often.

Answer: A,B,D

Question No: 238 – (Topic 3)

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

  1. Closed

  2. Open

  3. Filtered

Answer: B

Question No: 239 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-aresecure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

  1. The site should increase the encryption key length of the password.

  2. The site should restrict the number of login attempts to only three times.

  3. The site should force its users to change their passwords from time to time.

  4. The site should use CAPTCHA after a specific number of failed login attempts.

Answer: B,D

Question No: 240 – (Topic 3)

Which of the following ports must you filter to check null sessions on your network?

A. 139 and 445

B. 111 and 222

C. 1234 and 300

D. 130 and 200

Answer: A

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE