Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPEN Exam Dumps - GIAC Security Administration Questions and Answers

Question # 44

Which of the following best explains why you would warn to clear browser slate (history. cache, and cookies) between examinations of web servers when you've been trapping and altering values with a non-transparent proxy?

Options:

A.

Values trapped and stored in the browser will reveal the techniques you've used toexamine the web servers.

B.

Trapping and changing response values is beneficial for web site testing but usingthe same cached values in your browser will prevent you from being able to changethose values.

C.

Trapping and changing response values is beneficial for web site testing but willcause browser instability if not cleared.

D.

Values trapped and changed in the proxy, such as a cookie, will be stored by thebrowser and may impact further testing.

Buy Now
Question # 45

You are pen testing a Linux target from your windows-based attack platform. You just moved a script file from the windows system to the Linux target, but it will not execute properly. What is the most likely problem?

Options:

A.

The byte length is different on the two machines

B.

End of-line characters are different on the two machines

C.

The file must have become corrupt during transfer

D.

ASCII character sets are different on the two machines

Buy Now
Question # 46

Identify the network activity shown below;

Options:

A.

A sweep of available hosts on the local subnet

B.

A flood of the local switch's CAM table.

C.

An attempt to disassociate wireless clients.

D.

An attempt to impersonate the local gateway

Buy Now
Question # 47

When DNS is being used for load balancing, why would a penetration tester choose to identify a scan target by its IP address rather than its host name?

Options:

A.

Asingle IP may have multiple domains.

B.

A single domain name can only have one IP address.

C.

Scanning tools only recognize IP addresses

D.

A single domain name may have multiple IP addresses.

Buy Now
Question # 48

You suspect that a firewall or IPS exists between you and the target machine. Which nmap option will elicit responses from some firewalls and IPSs while being silently dropped by the target, thus confirming the existence of a firewall or IPS?

Options:

A.

–Traceroute

B.

–Firewalk

C.

–Badsum

D.

--SF

Buy Now
Question # 49

Adam is a novice Internet user. He is using Google search engine to search documents of his interest. Adam wants to search the text present in the link of a Website. Which of the following operators will he use in his query to accomplish the task?

Options:

A.

inanchor

B.

info

C.

link

D.

site

Buy Now
Question # 50

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Using a 16 bit SSID.

B.

Changing keys often.

C.

Using the longest key supported by hardware.

D.

Using a non-obvious key.

Buy Now
Question # 51

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Options:

A.

Single quote (')

B.

Semi colon (;)

C.

Double quote (")

D.

Dash (-)

Buy Now
Question # 52

What is the purpose of the following command?

C:\>wmic /node:[target IP] /user:[admin-user]

/password:[password] process call create [command]

Options:

A.

Running a command on a remote Windows machine

B.

Creating a service on a remote Windows machine

C.

Creating an admin account on a remote Windows machine

D.

Listing the running processes on a remote windows machine

Buy Now
Question # 53

A client has asked for a vulnerability scan on an internal network that does not have internet access. The rules of engagement prohibits any outside connection for the Nessus scanning machine. The customer has asked you to scan for a new critical vulnerability, which was released after the testing started, winch of the following methods of updating the Nessus plugins does not violate the rules of engagement?

Options:

A.

Connect the scanning machine via wireless bridge and download the updateddirectly

B.

Change the routing and connect through an alternative gateway

C.

Proceed with the test and note the limitation of updating the plugins

D.

Download the updates on an alternative machine and manually load on scanningmachine

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Aug 24, 2025
Questions: 385
GPEN pdf

GPEN PDF

$25.5  $84.99
GPEN Engine

GPEN Testing Engine

$28.5  $94.99
GPEN PDF + Engine

GPEN PDF + Testing Engine

$40.5  $134.99