まだGIACのGPEN認定試験を悩んでいますかこの情報の時代の中で専門なトレーニングを選択するのと思っていますか?良いターゲットのトレーニングを利用すれば有効で君のIT方面の大量の知識を補充 できます。GIACのGPEN認定試験によい準備ができて、試験に穏やかな心情をもって扱うことができます。Pass4Testの専門家が研究された問題集を利用してください。
ITテストと認定は当面の競争が激しい世界でこれまで以上に重要になりました。それは異なる世界の未来を意味しています。GIACのGPENの試験はあなたの職場生涯で重要な画期的な出来事になり、新しいチャンスを発見するかもしれません。ところが、GIACのGPENの試験にどうやって合格しますか。心配することはないですよ、ヘルプがあなたの手元にありますから。Pass4Testを利用したら恐いことはないです。Pass4TestのGIACのGPENの試験問題と解答は試験準備のパイオニアですから。
試験番号:GPEN問題集
試験科目:GIAC 「GIAC Certified Penetration Tester」
Pass4Testの専門家チームは彼らの経験と知識を利用して長年の研究をわたって多くの人は待ちに待ったGIACのGPEN認証試験について教育資料が完成してから、大変にお客様に歓迎されます。Pass4Testの模擬試験は真実の試験問題はとても似ている専門家チームの勤労の結果としてとても値打ちがあります。
IT業界の中でたくさんの野心的な専門家がいって、IT業界の中でより一層頂上まで一歩更に近く立ちたくてGIACのGPEN試験に参加して認可を得たくて、GIAC のGPEN試験が難度の高いので合格率も比較的低いです。GIACのGPEN試験を申し込むのは賢明な選択で今のは競争の激しいIT業界では、絶えず自分を高めるべきです。しかし多くの選択肢があるので君はきっと悩んでいましょう。
Pass4TestにIT業界のエリートのグループがあって、彼達は自分の経験と専門知識を使ってGIAC GPEN認証試験に参加する方に対して問題集を研究続けています。
GIACのGPEN試験にもっと首尾よく合格したいのですか。そうしたら速くPass4Testを選びましょう。Pass4Testは様々なIT認証試験を受ける人々に正確な試験資料を提供するサイトです。Pass4TestはIT職員としてのあなたに昇進するチャンスを与えられます。Pass4Test が提供したGIACのGPEN試験に関する一部の無料の問題と解答を利用してみることができます。そうすると、我々の信頼性をテストできます。
購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.pass4test.jp/GPEN.html
NO.1 A Web developer with your company wants to have wireless access for contractors that come in to work
on various projects. The process of getting this approved takes time. So rather than wait, he has put his
own wireless router attached to one of the network ports in his department. What security risk does this
present?
A. An unauthorized WAP is one way for hackers to get into a network.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. None, adding a wireless access point is a common task and not a security risk.
Answer: A
GIAC GPEN認定証 GPEN GPEN GPEN
NO.2 You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
A. Capture data on port 53 and performing banner grabbing.
B. Listen the incoming traffic on port 53 and execute the remote shell.
C. Listen the incoming data and performing port scanning.
D. Capture data on port 53 and delete the remote shell.
Answer: B
GIAC GPEN認定証 GPEN
NO.3 You work as a Network Administrator for Net World International. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows Server
2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its
Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the
company's network through wireless connections. The company's management wants to implement
Shared Key authentication for these laptops. When you try to configure the network interface card of one
of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared
Key authentication?
A. Install PEAP-MS-CHAP v2
B. Install Service Pack 1
C. Enable WEP
D. Install EAP-TLS
Answer: C
GIAC GPEN参考書 GPEN認定試験
NO.4 Which of the following attacks is a form of active eavesdropping in which the attacker makes
independent connections with the victims and relays messages between them, making them believe that
they are talking directly to each other over a private connection, when in fact the entire conversation is
controlled by the attacker?
A. DoS
B. Sniffing
C. Man-in-the-middle
D. Brute force
Answer: C
GIAC GPEN GPEN認定試験 GPEN
NO.5 Which of the following tools is used to verify the network structure packets and confirm that the packets
are constructed according to specification?
A. EtherApe
B. Snort decoder
C. AirSnort
D. snort_inline
Answer: B
GIAC GPEN GPEN認定試験 GPEN
NO.6 Which of the following statements are true about WPA?
Each correct answer represents a complete solution. Choose all that apply.
A. WPA-PSK converts the passphrase into a 256-bit key.
B. WPA provides better security than WEP.
C. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireles s client.
D. Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.
Answer: A,B,C,D
GIAC参考書 GPEN GPEN問題集 GPEN練習問題
NO.7 You work as a professional Ethical Hacker. You are assigned a project to perform blackhat testing on
www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition mechanic. You
claim that someone from the office called you saying that there is some fault in the air-conditioner of the
server room. After some inquiries/arguments, the Security Administrator allows you to repair the
air-conditioner of the server room.
When you get into the room, you found the server is Linux-based. You press the reboot button of the
server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly boots
backup into Knoppix. You mount the root partition of the server after replacing the root password in the
/etc/shadow file with a known password hash and salt. Further, you copy the netcat tool on the server and
install its startup files to create a reverse tunnel and move a shell to a remote server whenever the server
is restarted. You simply restart the server, pull out the Knoppix Live CD from the server, and inform that
the air-conditioner is working properly.
After completing this attack process, you create a security auditing report in which you mention various
threats such as social engineering threat, boot from Live CD, etc. and suggest the countermeasures to
stop booting from the external media and retrieving sensitive data. Which of the following steps have you
suggested to stop booting from the external media and retrieving sensitive data with regard to the above
scenario?
Each correct answer represents a complete solution. Choose two.
A. Encrypting disk partitions
B. Using password protected hard drives
C. Placing BIOS password
D. Setting only the root level access for sensitive data
Answer: A,B
GIAC GPEN練習問題 GPEN GPEN認定資格
NO.8 Which of the following enables an inventor to legally enforce his right to exclude others from using his
invention?
A. Patent
B. Spam
C. Phishing
D. Artistic license
Answer: A
GIAC GPEN認証試験 GPEN認定証 GPEN GPEN認定証
NO.9 Which of the following statements is true about the Digest Authentication scheme?
A. In this authentication scheme, the username and password are passed with every request, not just
when the user first types them.
B. A valid response from the client contains a checksum of the username, the password, the given
random value, the HTTP method, and the requested URL.
C. The password is sent over the network in clear text format.
D. It uses the base64 encoding encryption scheme.
Answer: B
GIAC GPEN過去問 GPEN
NO.10 John works as a professional Ethical Hacker. He has been assigned a project to test the security of
www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk
and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his
task?
A. TCP FTP proxy scanning
B. Eavesdropping
C. Web ripping
D. Fingerprinting
Answer: C
GIAC GPEN参考書 GPEN GPEN GPEN
NO.11 You have inserted a Trojan on your friend's computer and you want to put it in the startup so that
whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry
entries will you edit to accomplish the task?
A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start
B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
D.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Answer: D
GIAC GPEN問題集 GPEN GPEN GPEN参考書 GPEN
NO.12 Which of the following are the scanning methods used in penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
A. Vulnerability
B. Port
C. Network
D. Services
Answer: A,B,C
GIAC過去問 GPEN認証試験 GPEN認証試験 GPEN認定証 GPEN
NO.13 Which of the following types of cyber stalking damage the reputation of their victim and turn other
people against them by setting up their own Websites, blogs or user pages for this purpose?
A. Encouraging others to harass the victim
B. False accusations
C. Attempts to gather information about the victim
D. False victimization
Answer: B
GIAC練習問題 GPEN GPEN GPEN
NO.14 Which of the following statements are true about KisMAC?
A. Data generated by KisMAC can also be saved in pcap format.
B. It cracks WEP and WPA keys by Rainbow attack or by dictionary attack.
C. It scans for networks passively on supported cards.
D. It is a wireless network discovery tool for Mac OS X.
Answer: A,C,D
GIAC認定試験 GPEN過去問 GPEN認定証
NO.15 Which of the following is NOT an example of passive footprinting?
A. Scanning ports.
B. Analyzing job requirements.
C. Performing the whois query.
D. Querying the search engine.
Answer: A
GIAC練習問題 GPEN GPEN GPEN練習問題
NO.16 Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or
stop the traffic altogether?
A. Man-in-the-middle
B. ARP spoofing
C. Port scanning
D. Session hijacking
Answer: B
GIAC過去問 GPEN参考書 GPEN認定試験 GPEN参考書
NO.17 Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
A. FindSA
B. SQLDict
C. nmap
D. SQLBF
Answer: A,B,D
GIAC練習問題 GPEN認証試験 GPEN認定証 GPEN参考書
NO.18 Which of the following statements are true about SSIDs?
Each correct answer represents a complete solution. Choose all that apply.
A. SSIDs are case insensitive text strings and have a maximum length of 64 characters.
B. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other
networks will create a conflict.
C. SSID is used to identify a wireless network.
D. All wireless devices on a wireless network must have the same SSID in order to communicate with
each other.
Answer: B,C,D
GIAC GPEN GPEN過去問 GPEN練習問題
NO.19 You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an unauthorized
access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by your favorite sniffer,
Ethereal. You are able to discover the cause of the unauthorized access after noticing the following string
in the log file:
(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)
When you find All your 802.11b are belong to us as the payload string, you are convinced about which tool
is being used for the unauthorized access. Which of the following tools have you ascertained?
A. AirSnort
B. Kismet
C. AiroPeek
D. NetStumbler
Answer: D
GIAC問題集 GPEN GPEN認定証
NO.20 In which of the following scanning techniques does a scanner connect to an FTP server and request
that server to start data transfer to the third system?
A. Bounce attack scanning
B. Xmas Tree scanning
C. TCP FIN scanning
D. TCP SYN scanning
Answer: A
GIAC GPEN GPEN GPEN認定証 GPEN
NO.21 You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will
you take to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. Restart nessusd service.
B. Place nikto.pl file in the /var/www directory.
C. Place nikto.pl file in the /etc/nessus directory.
D. Place the directory containing nikto.pl in root's PATH environment variable.
Answer: A,D
GIAC GPEN認定試験 GPEN練習問題
NO.22 TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the
target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker
and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port
will drop the packet. Which of the following operating systems can be easily identified with the help of TCP
FIN scanning.?
A. Solaris
B. Red Hat
C. Windows
D. Knoppix
Answer: C
GIAC GPEN参考書 GPEN GPEN GPEN認証試験 GPEN認定試験
NO.23 Which of the following tools can be used to read NetStumbler's collected data files and present street
maps showing the logged WAPs as icons, whose color and shape indicates WEP mode and signal
strength?
A. NetStumbler
B. StumbVerter
C. WEPcrack
D. Kismet
Answer: B
GIAC GPEN GPEN GPEN問題集 GPEN問題集
NO.24 An executive in your company reports odd behavior on her PDA. After investigation you discover that a
trusted device is actually copying data off the PDA. The executive tells you that the behavior started
shortly after accepting an e-business card from an unknown person. What type of attack is this?
A. Session Hijacking
B. PDA Hijacking
C. Privilege Escalation
D. Bluesnarfing
Answer: D
GIAC問題集 GPEN認定証 GPEN GPEN GPEN
NO.25 Adam works on a Linux system. He is using Sendmail as the primary application to transmit emails.
Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files
contains e-mail information such as source and destination IP addresses, date and time stamps etc?
A. /log/var/logd
B. /var/log/logmail
C. /log/var/mailog
D. /var/log/mailog
Answer: D
GIAC GPEN認証試験 GPEN GPEN過去問 GPEN過去問
NO.26 Which of the following encryption modes are possible in WEP?
Each correct answer represents a complete solution. Choose all that apply.
A. No encryption
B. 256 bit encryption
C. 128 bit encryption
D. 40 bit encryption
Answer: A,C,D
GIAC GPEN GPEN
NO.27 Which of the following options holds the strongest password?
A. california
B. $#164aviD
没有评论:
发表评论