[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GPEN Dumps with VCE and PDF 81-90

CollectDumps 2017 Sep GIAC Official New Released GPEN
100% Free Download! 100% Pass Guaranteed!

GIAC Penetration Tester

Question No: 81 – (Topic 1) Is an IP address forvvww.scanned-server.com. Why are the results from the two scans, shown below, different?

Collectdumps 2017 PDF and VCE

  1. John.pot

  2. John conf

  3. John.rec

  4. John.ini

Answer: C

Question No: 82 – (Topic 1)

Based on the partial appdefstrig rile listed below, which port scan signature is classified by AMap as harmful?

Collectdumps 2017 PDF and VCE

  1. smtp

  2. netbios-session

  3. http-trace

  4. ms-remote-desktop-protocol

Answer: C

Question No: 83 – (Topic 1)

During a penetration test you discover a valid set of SSH credentials to a remote system. How can this be used to your advantage in a Nessus scan?

  1. This information can be entered under the #39;Hydra#39; tab to launch a brute-forcepassword attack.

  2. There isn#39;t an advantage as Nessus will ultimately discover this information.

  3. The quot;SSH#39; box can be checked to let Nessus know the remote system is running

  4. This information can be entered under the #39;credentials#39; tab to allow Nessus to log into the system

Answer: C

Question No: 84 – (Topic 1)

Which of the following best explains why you would warn to clear browser slate (history. cache, and cookies) between examinations of web servers when you#39;ve been trapping and altering values with a non-transparent proxy?

  1. Values trapped and stored in the browser will reveal the techniques you#39;ve used toexamine the web servers.

  2. Trapping and changing response values is beneficial for web site testing but usingthe same cached values in your browser will prevent you from being able to changethose values.

  3. Trapping and changing response values is beneficial for web site testing but willcause browser instability if not cleared.

  4. Values trapped and changed in the proxy, such as a cookie, will be stored by thebrowser and may impact further testing.

Answer: D

Question No: 85 – (Topic 1)

You have been contracted to penetration test an e-mail server for a client that wants to know for sure if the sendmail service is vulnerable to any known attacks. You have permission to run any type of test, how will you proceed to give the client the most valid answer?

  1. Run all known sendmail exploits against the server and see if you can compromisethe service, even if it crashed the machine or service

  2. Run a banner grabbing vulnerability checker to determine the sendmail version andpatch level, then look up and report all the vulnerabilities that exist for that versionand patch level

  3. Run all sendmail exploits that will not crash the server and see if you cancompromise the service

  4. Log into the e-mail and determine the sendmail version and patch level, then lookup and report all the vulnerabilities that exist for that version and patch level

Answer: C

Question No: 86 – (Topic 1)

When DNS is being used for load balancing, why would a penetration tester choose to identify a scan target by its IP address rather than its host name?

  1. Asingle IP may have multiple domains.

  2. A single domain name can only have one IP address.

  3. Scanning tools only recognize IP addresses

  4. A single domain name may have multiple IP addresses.

Answer: C



Question No: 87 – (Topic 1)

ACME corporation has decided to setup wireless (IEEE 802.11) network in it#39;s sales branch at Tokyo and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel they can use?

  1. 4

  2. 5

  3. 10

  4. 2

Answer: D

Question No: 88 – (Topic 1)

You successfully compromise a target system#39;s web application using blind command injection. The command you injected is ping-n 1 Assuming your machine is

192.168.1 200, which of the following would you see?

  1. Ping-n 1 192.168.1 200 on the compromised system

  2. A #39;Destination host unreachable#39; error message on the compromised system

  3. A packet containing #39;Packets: Sent – 1 Received = 1, Loss = 0 (0% loss) on yoursniffer

  4. An ICMP Echo packet on your sniffer containing the source address of the target

Answer: A

Question No: 89 – (Topic 1)

Analyze the screenshot below. What type of vulnerability is being attacked?

Collectdumps 2017 PDF and VCE

  1. Windows Server service

  2. Internet Explorer

  3. Windows Powershell

  4. Local Security Authority

Answer: B

Question No: 90 – (Topic 1)

A pen tester is able to pull credential information from memory on a Windows system. Based on the command and output below, what advantage does this technique give a penetration tester when trying to access another windows system on the network?

Collectdumps 2017 PDF and VCE

  1. The technique is more effective through perimeter firewalls than otherauthentication attacks.

  2. It allows the tester to escalate the privilege level of the account,

  3. Access to the system can be gained without password guessing or cracking.

  4. Salts are removed from the hashes to allow for faster, offline cracking

Answer: A

100% Free Download!
Download Free Demo:GPEN Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GPEN Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE