Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

New Release GPEN Security Administration Questions

Page: 12 / 14
Total 385 questions

GIAC Penetration Tester Questions and Answers

Question 45

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the preattack phase successfully:

Information gathering

Determination of network range

Identification of active systems

Location of open ports and applications

Now, which of the following tasks should he perform next?

Options:

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Fingerprint the services running on the we-are-secure network.

D.

Install a backdoor to log in remotely on the We-are-secure server.

Question 46

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Cross-site scripting

B.

Session sidejacking

C.

ARP spoofing

D.

Session fixation

Question 47

Which of the following statements about SSID is NOT true?

Options:

A.

Default settings of SSIDs are secure.

B.

All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

C.

It acts as a password for network access.

D.

It is used to identify a wireless network.

Question 48

What does APNIC stand for?

Options:

A.

Asia-Pacific Network Information Center

B.

American-Pacific Network Information Center

C.

American Private Network Information Center

D.

Asian Private Network Information Center

Page: 12 / 14
Total 385 questions