Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPEN Exam Dumps - GIAC Security Administration Questions and Answers

Question # 14

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value. What may be the reason?

Options:

A.

The zombie computer is the system interacting with some other system besides your comp uter.

B.

The firewall is blocking the scanning process.

C.

The zombie computer is not connected to the we-are-secure.com Web server.

D.

Hping does not perform idle scanning.

Buy Now
Question # 15

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Buffer overflow

B.

Web ripping

C.

DoS

D.

Sniffing

Buy Now
Question # 16

Which of the following does NOT use a proxy software to protect users?

Options:

A.

Stateful inspection

B.

Packet filtering

C.

Application layer gateway

D.

Circuit level proxy server

Buy Now
Question # 17

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Cross-site scripting

B.

Session sidejacking

C.

ARP spoofing

D.

Session fixation

Buy Now
Question # 18

You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

Options:

A.

256

B.

512

C.

1024

D.

64

Buy Now
Question # 19

In which layer of the OSI model does a sniffer operate?

Options:

A.

Network layer

B.

Session layer

C.

Presentation layer

D.

Data link layer

Buy Now
Question # 20

How many bits encryption does SHA-1 use?

Options:

A.

128

B.

140

C.

512

D.

160

Buy Now
Question # 21

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Options:

A.

Aeropeek

B.

Kismet

C.

Airsnort

D.

Void11

Buy Now
Question # 22

You work as a Network Administrator in the Secure Inc. You often need to send PDF documents that contain secret information, such as, client password, their credit card details, email passwords, etc. through email to your customers. However, you are making PDFs password protected you are getting complaints from customers that their secret information is being misused. When you analyze this complaint you get that however you are applying the passwords on PDFs, they are not providing the maximum protection. What may be the cause of this security hole?

Options:

A.

PDFs can be read easily in the plain-text form by applying a sniffer.

B.

PDFs are sent in email in the plain-text form.

C.

PDF passwords can easily be cracked by brute force attacks.

D.

You are applying easily guessed passwords.

Buy Now
Question # 23

What is the sequence in which packets are sent when establishing a connection to a secured network?

Options:

A.

Auth, Associate and Probe

B.

Probe, Auth and Associate

C.

Associate, Probe and Auth

D.

Probe. Associate and Auth

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Aug 24, 2025
Questions: 385
GPEN pdf

GPEN PDF

$25.5  $84.99
GPEN Engine

GPEN Testing Engine

$28.5  $94.99
GPEN PDF + Engine

GPEN PDF + Testing Engine

$40.5  $134.99