GIAC GPEN - GIAC Penetration Tester Exam
Page: 2 / 77
Total 385 questions
Question #6 (Topic: Topic 1)
What command will correctly reformat the Unix passwordcopy and shadowcopy Tiles for
input to John The Ripper?
input to John The Ripper?
A. /Un shadow passwd copy shadowcopy > johnfile
B. /Unshadow passwdcopy shadowcopy > johnfile
C. /Unshadow shadowcopy passwdcopy >john file
D. /Unshadow passwdcopy shadowcopy > johnfile
Answer: C
Question #7 (Topic: Topic 1)
Which of the following is possible in some SQL injection vulnerabilities on certain types of
databases that affects the underlying server OS?
databases that affects the underlying server OS?
A. Database structure retrieval
B. Shell command execution
C. Data manipulation
D. Data query capabilities
Answer: A
Question #8 (Topic: Topic 1)
Which of the following describes the direction of the challenges issued when establishing a
wireless (IEEE 802.11) connection?
wireless (IEEE 802.11) connection?
A. One-way, the client challenges the access point
B. One-way, the access point challenges the client
C. No challenges occur (or wireless connection
D. Two-way, both the client and the access point challenge each other
Answer: D
Question #9 (Topic: Topic 1)
While scanning a remote system that is running a web server with a UDP scan and
monitoring the scan with a sniffer, you notice that the target is responding with ICMP Port
Unreachable only once a second What operating system is the target likely running?
monitoring the scan with a sniffer, you notice that the target is responding with ICMP Port
Unreachable only once a second What operating system is the target likely running?
A. Linux
B. Windows
C. OpenBSD
D. Mac OS X
Answer: A
Question #10 (Topic: Topic 1)
Approximately how many packets are usually required to conduct a successful FMS attack
onWEP?
onWEP?
A. 250.000
B. 20.000
C. 10.000,000
D. l (with a weak IV)
Answer: B