Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Full Access GIAC GPEN Tutorials

Page: 13 / 14
Total 385 questions

GIAC Penetration Tester Questions and Answers

Question 49

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

Options:

A.

Insertion

B.

Evasion

C.

Fragmentation overwrite

D.

Fragmentation overlap

Question 50

Which of the following is the correct syntax to create a null session?

Options:

A.

c:\>net view \\IP_addr\IPC$ "" /u: ""

B.

c:\>net view \\IPC$\IP_addr "" /u: ""

C.

c:\>net use \\IP_addr\IPC$ "" /u: ""

D.

c:\>net use \\IPC$\IP_addr "" /u: ""

Question 51

Which of the following tools is used for SNMP enumeration?

Options:

A.

SARA

B.

Userinfo

C.

Getif

D.

Enum

Question 52

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

Options:

A.

Post-attack phase

B.

Attack phase

C.

On-attack phase

D.

Pre-attack phase

Page: 13 / 14
Total 385 questions