Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration GPEN Release Date

Page: 8 / 14
Total 385 questions

GIAC Penetration Tester Questions and Answers

Question 29

Why is OSSTMM beneficial to the pen tester?

Options:

A.

It provides a legal and contractual framework for testing

B.

It provides in-depth knowledge on tools

C.

It provides report templates

D.

It includes an automated testing engine similar to Metasploit

Question 30

You are pen testing a network and have shell access to a machine via Netcat. You try to use ssh to access another machine from the first machine. What is the expected result?

Options:

A.

The ssh connection will succeed If you have root access on the intermediate

machine

B.

The ssh connection will fail

C.

The ssh connection will succeed

D.

The ssh connection will succeed if no password required

Question 31

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Bluebug attack

B.

SQL injection attack

C.

Cross site scripting attack

D.

Social engineering

E.

Bluesnarfing

Question 32

You are a Web Administrator of Millennium Inc. The company has hosted its Web site within its network. The management wants the company's vendors to be able to connect to the corporate site from their locations through the Internet. As a public network is involved in this process, you are concerned about the security of data transmitted between the vendors and the corporate site.

Which of the following can help you?

Options:

A.

EAP

B.

WEP

C.

Smart card

D.

VPN

Page: 8 / 14
Total 385 questions