Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC GPEN Actual Questions

Page: 2 / 14
Total 385 questions

GIAC Penetration Tester Questions and Answers

Question 5

Ryan wants to create an ad hoc wireless network so that he can share some important files with another employee of his company. Which of the following wireless security protocols should he choose for setting up an ad hoc wireless network?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WPA2 -EAP

B.

WPA-PSK

C.

WPA-EAP

D.

WEP

Question 6

You work as a Network Administrator in the Secure Inc. You often need to send PDF documents that contain secret information, such as, client password, their credit card details, email passwords, etc. through email to your customers. However, you are making PDFs password protected you are getting complaints from customers that their secret information is being misused. When you analyze this complaint you get that however you are applying the passwords on PDFs, they are not providing the maximum protection. What may be the cause of this security hole?

Options:

A.

PDFs can be read easily in the plain-text form by applying a sniffer.

B.

PDFs are sent in email in the plain-text form.

C.

PDF passwords can easily be cracked by brute force attacks.

D.

You are applying easily guessed passwords.

Question 7

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:

A.

Man-in-the-middle

B.

ARP spoofing

C.

Port scanning

D.

Session hijacking

Question 8

John works as an Ethical Hacker for uCertify Inc. He wants to find out the ports that are open in uCertify's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

Options:

A.

TCP FIN

B.

Xmas tree

C.

TCP SYN/ACK

D.

TCP SYN

Page: 2 / 14
Total 385 questions