Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration GPEN Full Course Free

Page: 3 / 14
Total 385 questions

GIAC Penetration Tester Questions and Answers

Question 9

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

Options:

A.

The we-are-secure.com server is using honeypot.

B.

The we-are-secure.com server is using a TCP wrapper.

C.

The telnet service of we-are-secure.com has corrupted.

D.

The telnet session is being affected by the stateful inspection firewall.

Question 10

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of Inc. On the We-are-secure Website login page, he enters= 'or''=' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.

Use the session_regenerate_id() function

B.

Use the escapeshellcmd() function

C.

Use the mysql_real_escape_string() function for escaping input

D.

Use the escapeshellarg() function

Question 11

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value. What may be the reason?

Options:

A.

The zombie computer is the system interacting with some other system besides your comp uter.

B.

The firewall is blocking the scanning process.

C.

The zombie computer is not connected to the we-are-secure.com Web server.

D.

Hping does not perform idle scanning.

Question 12

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Page: 3 / 14
Total 385 questions