Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GPEN GIAC Penetration Tester Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GPEN GIAC Penetration Tester certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 6
Total 385 questions

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam's system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.

How many bits does SYSKEY use for encryption?

A.

32

B.

64

C.

512

D.

128

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

A.

Single quote (')

B.

Semi colon (;)

C.

Double quote (")

D.

Dash (-)

John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.

For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

A.

ICMP ping flood tool

B.

Kismet

C.

Netstumbler

D.

AirSnort

You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?

A.

Configuration of VPN access

B.

Setting up of monitoring on ISA Server

C.

Defining ISA Server network configuration

D.

Defining how ISA Server would cache Web contents

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

A.

Close port TCP 53.

B.

Change the default community string names.

C.

Upgrade SNMP Version 1 with the latest version.

D.

Install antivirus.

You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?

A.

Implement WEP

B.

Implement WPA

C.

Don't broadcast SSID

D.

Implement MAC filtering

You want to retrieve the default security report of nessus. Which of the following google search queries will you use?

A.

site:pdf nessus "Assessment report"

B.

filetype:pdf nessus

C.

filetype:pdf "Assessment Report" nessus

D.

link:pdf nessus "Assessment report"

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He uses a Windows XP operating system to do this. He enters the following command on the command prompt:

c:\tracert www.we-are-secure.com

However, he receives an incomplete traceroute result. What could be the reasons for getting an incomplete result for the tracert command?

Each correct answer represents a complete solution. Choose all that apply.

A.

A router along the path is overloaded.

B.

John's computer is behind a firewall that blocks incoming ICMP error messages.

C.

There is no route to the we-are-secure server.

D.

The we-are-secure server is down and is not connected to the Internet.

You run the following command while using Nikto Web scanner:

perl nikto.pl -h 192.168.0.1 -p 443

What action do you want to perform?

A.

Updating Nikto.

B.

Seting Nikto for network sniffing.

C.

Port scanning.

D.

Using it as a proxy server.

Which of the following attacks can be overcome by applying cryptography?

A.

Web ripping

B.

Sniffing

C.

DoS

D.

Buffer overflow

You have changed the RestrictAnonymous registry setting from 0 to 1 on your servers to secure your Windows 2000 system so that any malicious user cannot establish a null session on the server. However, when you test the security using userinfo tool, you got that you can still establish the null session. What may be its reason?

A.

You cannot disable establishing null sessions.

B.

You need to disable the promiscuous mode of network Ethernet card.

C.

You need to set the RestrictAnonymous key value to 2 instead of 1.

D.

You need to install a firewall.

Fill in the blanks with the appropriate protocol.

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is an IEEE___ encryption protocol created to replace both TKIP and WEP.

In which of the following scanning methods does an attacker send SYN packets and then a RST packet?

A.

TCP SYN scan

B.

XMAS scan

C.

IDLE scan

D.

TCP FIN scan

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

Spoofing

B.

Wiretapping

C.

Phishing

D.

SMB signing

You work as an IT Technician for uCertify Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

A.

MAC Filtering

B.

SSID

C.

RAS

D.

WEP

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam's system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.

Which of the following are the drawbacks of the NTLM Web authentication scheme?

Each correct answer represents a complete solution. Choose all that apply.

A.

It can be brute forced easily.

B.

It works only with Microsoft Internet Explorer.

C.

The password is sent in clear text format to the Web server.

D.

The password is sent in hashed format to the Web server.

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

A.

A SQL injection attack

B.

A Denial-of-Service attack

C.

A buffer overflow

D.

An XSS attack

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com network. Now, when you have finished your penetration testing, you find that the weare- secure.com server is highly vulnerable to SNMP enumeration. You advise the we-are-secure Inc. to turn off SNMP; however, this is not possible as the company is using various SNMP services on its remote nodes. What other step can you suggest to remove SNMP vulnerability?

Each correct answer represents a complete solution. Choose two.

A.

Change the default community string names.

B.

Install antivirus.

C.

Close port TCP 53.

D.

Upgrade SNMP Version 1 with the latest version.

Page: 4 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved