2014年3月26日星期三

Le plus récent matériel de formation examen GIAC GPEN de certification

Pass4Test possède une grande équipe composée des experts IT qui travaillent dur avec leurs riches expériences et connaissances pour produire un bon outil de formation. Selon les anciens test, le test simulation de Pass4Test est bien lié avec le test réel. Pass4Test peut vous assurer à réussir le test. Maintenant vous ajoutez votre outil de formation au panier, et votre rêve réalisera bien tôt.

Vous pouvez tout d'abord télécharger le démo GIAC GPEN gratuit dans le site Pass4Test. Une fois que vous décidez à choisir le Pass4Test, Pass4Test va faire tous efforts à vous permettre de réussir le test. Si malheureusement, vous ne passez pas le test, nous allons rendre tout votre argent.

Code d'Examen: GPEN
Nom d'Examen: GIAC (GIAC Certified Penetration Tester)
Questions et réponses: 384 Q&As

Si vous traviallez dur encore pour préparer le test de GIAC GPEN et réaliser votre but plus vite, Pass4Test peut vous donner une solution plus pratique. Choisir la Q&As de Pass4Test qui vous assure que c'est pas un rêve à réussir le test GIAC GPEN.

Nous croyons que pas mal de candidats voient les autres site web qui offrent les ressources de Q&A GIAC GPEN. En fait, le Pass4Test est le seul site qui puisse offrir la Q&A recherchée par les experts réputés dans l'Industrie IT. Grâce à la Q&A de Pass4Test impressionée par la bonne qualité, vous pouvez réussir le test GIAC GPEN sans aucune doute.

Le succès n'est pas loin de vous si vous choisissez Pass4Test. Vous allez obtenir le Certificat de GIAC GPEN très tôt. Pass4Test peut vous permettre à réussir 100% le test GIAC GPEN, de plus, un an de service en ligne après vendre est aussi gratuit pour vous.

GPEN Démo gratuit à télécharger: http://www.pass4test.fr/GPEN.html

NO.1 You work as a Network Administrator for Infosec Inc. Nowadays, you are facing an
unauthorized access in your Wi-Fi network. Therefore, you analyze a log that has been recorded by
your favorite sniffer, Ethereal. You are able to discover the cause of the unauthorized access after
noticing the following string in the log file:
(Wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001)
When you find All your 802.11b are belong to us as the payload string, you are convinced about
which tool is being used for the unauthorized access. Which of the following tools have you
ascertained?
A. AirSnort
B. Kismet
C. AiroPeek
D. NetStumbler
Answer: D

GIAC   GPEN   GPEN examen

NO.2 You work as a professional Ethical Hacker. You are assigned a project to perform blackhat
testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition
mechanic. You claim that someone from the office called you saying that there is some fault in the
air-conditioner of the server room. After some inquiries/arguments, the Security Administrator
allows you to repair the air-conditioner of the server room.
When you get into the room, you found the server is Linux-based. You press the reboot button of
the server after inserting knoppix Live CD in the CD drive of the server. Now, the server promptly
boots backup into Knoppix. You mount the root partition of the server after replacing the root
password in the /etc/shadow file with a known password hash and salt. Further, you copy the netcat
tool on the server and install its startup files to create a reverse tunnel and move a shell to a remote
server whenever the server is restarted. You simply restart the server, pull out the Knoppix Live CD
from the server, and inform that the air-conditioner is working properly.
After completing this attack process, you create a security auditing report in which you mention
various threats such as social engineering threat, boot from Live CD, etc. and suggest the
countermeasures to stop booting from the external media and retrieving sensitive data. Which of
the following steps have you suggested to stop booting from the external media and retrieving
sensitive data with regard to the above scenario?
Each correct answer represents a complete solution. Choose two.
A. Encrypting disk partitions
B. Using password protected hard drives
C. Placing BIOS password
D. Setting only the root level access for sensitive data
Answer: A,B

GIAC   GPEN examen   certification GPEN   GPEN

NO.3 Which of the following is NOT an example of passive footprinting?
A. Scanning ports.
B. Analyzing job requirements.
C. Performing the whois query.
D. Querying the search engine.
Answer: A

GIAC examen   certification GPEN   GPEN   certification GPEN   GPEN

NO.4 Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
A. FindSA
B. SQLDict
C. nmap
D. SQLBF
Answer: A,B,D

GIAC examen   GPEN examen   certification GPEN   GPEN examen   GPEN

NO.5 Which of the following statements are true about SSIDs?
Each correct answer represents a complete solution. Choose all that apply.
A. SSIDs are case insensitive text strings and have a maximum length of 64 characters.
B. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks
will create a conflict.
C. SSID is used to identify a wireless network.
D. All wireless devices on a wireless network must have the same SSID in order to communicate
with each other.
Answer: B,C,D

GIAC   GPEN   GPEN

NO.6 Which of the following attacks allows an attacker to sniff data frames on a local area network
(LAN) or stop the traffic altogether?
A. Man-in-the-middle
B. ARP spoofing
C. Port scanning
D. Session hijacking
Answer: B

GIAC examen   GPEN   GPEN

NO.7 Adam works on a Linux system. He is using Sendmail as the primary application to transmit
emails.
Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log
files contains e-mail information such as source and destination IP addresses, date and time stamps
etc?
A. /log/var/logd
B. /var/log/logmail
C. /log/var/mailog
D. /var/log/mailog
Answer: D

GIAC   GPEN   GPEN   GPEN   GPEN   certification GPEN

NO.8 You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
A. Capture data on port 53 and performing banner grabbing.
B. Listen the incoming traffic on port 53 and execute the remote shell.
C. Listen the incoming data and performing port scanning.
D. Capture data on port 53 and delete the remote shell.
Answer: B

certification GIAC   GPEN   GPEN examen   certification GPEN

NO.9 Which of the following encryption modes are possible in WEP?
Each correct answer represents a complete solution. Choose all that apply.
A. No encryption
B. 256 bit encryption
C. 128 bit encryption
D. 40 bit encryption
Answer: A,C,D

certification GIAC   GPEN   certification GPEN   GPEN examen   GPEN examen

NO.10 A Web developer with your company wants to have wireless access for contractors that come
in to work on various projects. The process of getting this approved takes time. So rather than wait,
he has put his own wireless router attached to one of the network ports in his department. What
security risk does this present?
A. An unauthorized WAP is one way for hackers to get into a network.
B. It is likely to increase network traffic and slow down network performance.
C. This circumvents network intrusion detection.
D. None, adding a wireless access point is a common task and not a security risk.
Answer: A

GIAC   GPEN examen   GPEN   GPEN   GPEN   GPEN examen

NO.11 Which of the following options holds the strongest password?
A. california
B. $#164aviD

没有评论:

发表评论