Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPEN Exam Dumps - GIAC Security Administration Questions and Answers

Question # 34

You work as a professional Ethical Hacker. You are assigned a project to perform blackhat testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition mechanic. You claim that someone from the office called you saying that there is some fault in the air-conditioner of the server room. After some inquiries/arguments, the Security Administrator allows you to repair the air-conditioner of the server room.

When you get into the room, you found the server is Linux-based. You press the reboot button of the server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly boots backup into Knoppix. You mount the root partition of the server after replacing the root password in the /etc/shadow file with a known password hash and salt. Further, you copy the netcat tool on the server and install its startup files to create a reverse tunnel and move a shell to a remote server whenever the server is restarted. You simply restart the server, pull out the Knoppix Live CD from the server, and inform that the air-conditioner is working properly.

After completing this attack process, you create a security auditing report in which you mention various threats such as social engineering threat, boot from Live CD, etc. and suggest the countermeasures to stop booting from the external media and retrieving sensitive data. Which of the following steps have you suggested to stop booting from the external media and retrieving sensitive data with regard to the above scenario?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Setting only the root level access for sensitive data.

B.

Encrypting disk partitions.

C.

Placing BIOS password.

D.

Using password protected hard drives.

Buy Now
Question # 35

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Web ripping

B.

Sniffing

C.

DoS

D.

Buffer overflow

Buy Now
Question # 36

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SQL injection attack

B.

Cross site scripting attack

C.

Bluebug attack

D.

Bluesnarfing

E.

Social engineering

Buy Now
Question # 37

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters = 'or''=' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.

Use the escapeshellarg() function

B.

Use the session_regenerate_id() function

C.

Use the mysql_real_escape_string() function for escaping input

D.

Use the escapeshellcmd() function

Buy Now
Question # 38

Which of the following tools can be used to perform Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

Cain

B.

L0phtcrack

C.

Pass-the-hash toolkit

D.

John the Ripper

Buy Now
Question # 39

You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?

Options:

A.

Cain and Abel

B.

Brutus

C.

Dsniff

D.

Nmap

Buy Now
Question # 40

Which of the following tools can be used to enumerate networks that have blocked ICMP Echo packets, however, failed to block timestamp or information packet or not performing sniffing of trusted addresses, and it also supports spoofing and promiscuous listening for reply packets?

Options:

A.

Nmap

B.

Zenmap

C.

Icmpenum

D.

Nessus

Buy Now
Question # 41

What happens when you scan a broadcast IP address of a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It will show an error in the scanning process.

B.

Scanning of the broadcast IP address cannot be performed.

C.

It may show smurf DoS attack in the network IDS of the victim.

D.

It leads to scanning of all the IP addresses on that subnet at the same time.

Buy Now
Question # 42

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Cross-Site Scripting attack

C.

Cross-Site Request Forgery

D.

Code injection attack

Buy Now
Question # 43

You suspect that system administrators In one part of the target organization are turning off their systems during the times when penetration tests are scheduled, what feature could you add to the ' Rules of engagement' that could help your team test that part of the target organization?

Options:

A.

Un announced test

B.

Tell response personnel the exact lime the test will occur

C.

Test systems after normal business hours

D.

Limit tests to business hours

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Aug 24, 2025
Questions: 385
GPEN pdf

GPEN PDF

$25.5  $84.99
GPEN Engine

GPEN Testing Engine

$28.5  $94.99
GPEN PDF + Engine

GPEN PDF + Testing Engine

$40.5  $134.99