Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF GPEN Study Guide

Page: 9 / 14
Total 385 questions

GIAC Penetration Tester Questions and Answers

Question 33

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is supported by all manufacturers of wireless LAN hardware and software.

B.

It uses a public key certificate for server authentication.

C.

It uses password hash for client authentication.

D.

It provides a moderate level of security.

Question 34

You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?

Options:

A.

Nmap

B.

Sam spade

C.

Whois

D.

Google

Question 35

Which of the following commands can be used for port scanning?

Options:

A.

nc -z

B.

nc -t

C.

nc -w

D.

nc –g

Question 36

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

Options:

A.

Configuration of VPN access

B.

Setting up of monitoring on ISA Server

C.

Defining ISA Server network configuration

D.

Defining how ISA Server would cache Web contents

Page: 9 / 14
Total 385 questions