Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPEN Exam Dumps - GIAC Security Administration Questions and Answers

Question # 24

John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.

For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

Options:

A.

ICMP ping flood tool

B.

Kismet

C.

Netstumbler

D.

AirSnort

Buy Now
Question # 25

Which of the following ports must you filter to check null sessions on your network?

Options:

A.

139 and 445

B.

111 and 222

C.

1234 and 300

D.

130 and 200

Buy Now
Question # 26

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the

Linux terminal:chmod 741 secure.c

Considering the above scenario, which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

John is restricting a guest to only write or execute the secure.c file.

B.

John is providing all rights to the owner of the file.

C.

By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

D.

The textual representation of the file access permission of 741 will be -rwxr--rw-.

Buy Now
Question # 27

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.

Recently, John's company has got a project to test the security of a promotional Website

www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."

Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:

A.

XSS attack

B.

Replay attack

C.

Buffer overflow attack

D.

CSRF attack

Buy Now
Question # 28

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

Options:

A.

172.16.10.90

B.

209.191.91.180

C.

141.1.1.1

D.

216.168.54.25

Buy Now
Question # 29

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

Options:

A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam's system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.

Buy Now
Question # 30

The employees of EWS Inc. require remote access to the company's Web servers. In order to provide solid wireless security, the company uses EAP-TLS as the authentication protocol. Which of the following statements are true about EAP-TLS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is supported by all manufacturers of wireless LAN hardware and software.

B.

It uses a public key certificate for server authentication.

C.

It uses password hash for client authentication.

D.

It provides a moderate level of security.

Buy Now
Question # 31

John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.

For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

Options:

A.

ICMP ping flood tool

B.

Kismet

C.

Netstumbler

D.

AirSnort

Buy Now
Question # 32

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. John has gained the access to the network of the organization and placed a backdoor in the network. Now, he wants to clear all event logs related to previous hacking attempts. Which of the following tools can John use if we-are-secure.com is using the Windows 2000 server?

Each correct answer represents a complete solution. Choose two.

Options:

A.

elsave.exe

B.

WinZapper

C.

AuditPol

D.

Blindside

Buy Now
Question # 33

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Options:

A.

Single quote (')

B.

Semi colon (;)

C.

Double quote (")

D.

Dash (-)

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Aug 24, 2025
Questions: 385
GPEN pdf

GPEN PDF

$25.5  $84.99
GPEN Engine

GPEN Testing Engine

$28.5  $94.99
GPEN PDF + Engine

GPEN PDF + Testing Engine

$40.5  $134.99