Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GPEN GIAC Penetration Tester Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GPEN GIAC Penetration Tester certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 6
Total 385 questions

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

A.

Artistic license

B.

Spam

C.

Patent

D.

Phishing

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

A.

MINIX 3

B.

Linux

C.

Windows XP

D.

Mac OS

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Public key certificate for server authentication

B.

Password hash for client authentication

C.

Strongest security level

D.

Dynamic key encryption

Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

A.

WPA2

B.

WPA-PSK

C.

WEP

D.

WPA-EAP

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Using the longest key supported by hardware.

B.

Using a 16 bit SSID.

C.

Changing keys often.

D.

Using a non-obvious key.

Which of the following is an open source Web scanner?

A.

Nikto

B.

GFI LANguird

C.

NetRecon

D.

Internet scanner

Which of the following tasks is NOT performed by antiviruses?

A.

Activity blocking

B.

Heuristic scanning

C.

Integrity scanning

D.

Session hijacking

Which of the following is a web ripping tool?

A.

Netcat

B.

NetBus

C.

SuperScan

D.

Black Widow

Which of the following is NOT a Back orifice plug-in?

A.

BOSOCK32

B.

STCPIO

C.

BOPeep

D.

Beast

When attempting to crack a password using Rainbow Tables, what is the output of the reduction function?

A.

A new potential chain

B.

A new potential table

C.

A new potential password

D.

A new potential hash

You have compromised a Windows XP system and Injected the Meterpreter payload into the lsass process. While looking over the system you notice that there is a popular password management program on the system. When you attempt to access the file that contains the password you find it is locked. Further investigation reveals that it is locked by the passmgr process. How can you use the Meterpreter to get access to this file?

A.

Use the getuid command to determine the user context the process is runningunder, then use the imp command to impersonate that user.

B.

use the getpid command to determine the user context the process is runningunder, then use the Imp command to impersonate that user.

C.

Use the execute command to the passmgr executable. That will give you access to

the file.

D.

Use the migrate command to jump to the passmgr process. That will give you accessto the file.

Which of the following is the JavaScript variable used to store a cookie?

A.

Browsercookie

B.

Windowcookie

C.

Document cookie

D.

Session cookie

What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?

A.

Methodology

B.

Conclusions

C.

Executive Summary

D.

Findings

While performing an assessment on a banking site, you discover the following link:

hnps://mybank.com/xfer.aspMer_toMaccount_number]&amount-[dollars]

Assuming authenticated banking users can be lured to your web site, which crafted html tag may be used to launch a XSRF attack?

A.

B.

alert('hnps:/'mybank.com/xfer.a$p?xfer_io-[attacker_account]&amoutn-[dollars]')</script>

C.

document.\write('hTtp$://mybankxom/xfer.a$p?xfer_to-[attacker.accountl

&amount-[dollars)</script>

D.

In the screen shot below, which selections would you need click in order to intercept and alter all http traffic passing through OWASP ZAP?

A.

Trap response and continue

B.

Set Break and Continue

C.

Trap request and continue

D.

Continue and drop

You have been contracted to perform a black box pen test against the Internet facing servers for a company. They want to know, with a high level of confidence, if their servers are vulnerable to external attacks. Your contract states that you can use all tools available to you to pen test the systems. What course of action would you use to generate a report with the lowest false positive rate?

A.

Use a port scanner to find open service ports and generate a report listing allvulnerabilities associated with those listening services.

B.

Use a vulnerability or port scanner to find listening services and then try to exploitthose services.

C.

Use a vulnerability scanner to generate a report of vulnerable services.

D.

Log into the system and record the patch levels of each service then generate areport that lists known vulnerabilities for all the running services.

Which of the following is the feature that separates the use of Rainbow Tables from other applications such as Cain or John the Ripper?

A.

Salts are used to create massive password databases for comparison.

B.

Applications take advantage of 64-bit CPU processor and multithread the crackingprocess.

C.

Data Is aligned efficiently in the rainbow tables making the search process quicker

D.

Raw hashed passwords are compared to pre-calculated hash tables.

Which of the following best explains why you would warn to clear browser slate (history. cache, and cookies) between examinations of web servers when you've been trapping and altering values with a non-transparent proxy?

A.

Values trapped and stored in the browser will reveal the techniques you've used toexamine the web servers.

B.

Trapping and changing response values is beneficial for web site testing but usingthe same cached values in your browser will prevent you from being able to changethose values.

C.

Trapping and changing response values is beneficial for web site testing but willcause browser instability if not cleared.

D.

Values trapped and changed in the proxy, such as a cookie, will be stored by thebrowser and may impact further testing.

Analyze the command output below. What information can the tester infer directly from the Information shown?

A.

Usernames for the domain tesrdomain.com

B.

Directory indexing is allowed on the web server

C.

Vulnerable versions of Adobe software in use

D.

Naming convention for public documents

You are conducting a penetration test for a private company located in Canada. The scope extends to all internal-facing hosts controlled by the company. You have gathered necessary hold-harmless and non-disclosure agreements. Which action by your group can incur criminal liability under Criminal Code of Canada Sections 184 and 542 CC 184?

A.

Analyzing internal firewall router software for vulnerabilities

B.

Exploiting application vulnerabilities on end-user workstations

C.

Attempting to crack passwords on a development server

D.

Capturing a VoIP call to a third party without prior notice

Page: 2 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved