Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPEN Exam Dumps - GIAC Security Administration Questions and Answers

Question # 4

Which of the following options holds the strongest password?

Options:

A.

Joe12is23good

B.

$#164aviD^%

C.

california

D.

Admin1234

Buy Now
Question # 5

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.

Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<</b>script>alert('Hi, John')<</b>/script>

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."

Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:

A.

Replay attack

B.

Buffer overflow attack

C.

CSRF attack

D.

XSS attack

Buy Now
Question # 6

Which of the following tools is an example of HIDS?

Options:

A.

Anti-Spector

B.

Auditpol.exe

C.

Elsave

D.

Log File Monitor

Buy Now
Question # 7

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

Options:

A.

WEP

B.

VPN

C.

Intranet

D.

Extranet

Buy Now
Question # 8

Which of the following tools is not a BlueSnarf attacking tool?

Options:

A.

Blooover

B.

Redsnarf

C.

BlueSnarfer

D.

Freejack

Buy Now
Question # 9

How many bits encryption does SHA-1 use?

Options:

A.

128

B.

140

C.

512

D.

160

Buy Now
Question # 10

Which of the following is the second half of the LAN manager Hash?

Options:

A.

0xAAD3B435B51404BB

B.

0xAAD3B435B51404CC

C.

0xAAD3B435B51404EE

D.

0xAAD3B435B51404AA

Buy Now
Question # 11

Which of the following tools is spyware that makes Windows clients send their passwords as clear text?

Options:

A.

Pwddump2

B.

SMBRelay

C.

KrbCrack

D.

C2MYAZZ

Buy Now
Question # 12

Which of the following tools uses exploits to break into remote operating systems?

Options:

A.

Nessus

B.

Metasploit framework

C.

Nmap

D.

John the Ripper

Buy Now
Question # 13

Which of the following is the most common method for an attacker to spoof email?

Options:

A.

Back door

B.

Replay attack

C.

Man in the middle attack

D.

Open relay

Buy Now
Exam Code: GPEN
Exam Name: GIAC Penetration Tester
Last Update: Aug 24, 2025
Questions: 385
GPEN pdf

GPEN PDF

$25.5  $84.99
GPEN Engine

GPEN Testing Engine

$28.5  $94.99
GPEN PDF + Engine

GPEN PDF + Testing Engine

$40.5  $134.99