Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GPEN GIAC Penetration Tester Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GPEN GIAC Penetration Tester certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 385 questions

You want to perform an active session hijack against Secure Inc. You have found a target that allows Telnet session. You have also searched an active session due to the high level of traffic on the network. What should you do next?

A.

Use a sniffer to listen network traffic.

B.

Guess the sequence numbers.

C.

Use brutus to crack telnet password.

D.

Use macoff to change MAC address.

Which of the following is the correct syntax to create a null session?

A.

c:\>net view \\IP_addr\IPC$ "" /u: ""

B.

c:\>net view \\IPC$\IP_addr "" /u: ""

C.

c:\>net use \\IP_addr\IPC$ "" /u: ""

D.

c:\>net use \\IPC$\IP_addr "" /u: ""

Which of the following tools can be used for session splicing attacks?

A.

ADMutate

B.

APNIC

C.

Whisker

D.

ARIN

You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?

A.

Sam spade

B.

Nmap

C.

Whois

D.

Google

Which of the following techniques are NOT used to perform active OS fingerprinting?

Each correct answer represents a complete solution. Choose all that apply.

A.

ICMP error message quoting

B.

Analyzing email headers

C.

Sniffing and analyzing packets

D.

Sending FIN packets to open ports on the remote system

Which of the following is NOT a Back orifice plug-in?

A.

BOSOCK32

B.

STCPIO

C.

BOPeep

D.

Beast

The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Strongest security level

B.

Dynamic key encryption

C.

Password hash for client authentication

D.

Public key certificate for server authentication

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

A.

Insertion

B.

Evasion

C.

Fragmentation overwrite

D.

Fragmentation overlap

Fill in the blank with the appropriate act name.

The ____act gives consumers the right to ask emailers to stop spamming them.

Which of the following is a web ripping tool?

A.

Netcat

B.

NetBus

C.

SuperScan

D.

Black Widow

Which of the following is NOT a valid DNS zone type?

A.

Stub zone

B.

Secondary zone

C.

AlterNet zone

D.

Primary zone

You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

A.

1024

B.

256

C.

512

D.

64

Which of the following tools allows you to download World Wide Web sites from the Internet to a local computer?

A.

Netstat

B.

Netcraft

C.

HTTrack

D.

Cheops-ng

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

Gathering information

Determining the network range

Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

A.

APNIC

B.

SuperScan

C.

ARIN

D.

RIPE

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

A.

Aeropeek

B.

Kismet

C.

Airsnort

D.

Void11

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Rule based attack

C.

Hybrid attack

D.

Brute Force attack

Which of the following does NOT use a proxy software to protect users?

A.

Stateful inspection

B.

Packet filtering

C.

Application layer gateway

D.

Circuit level proxy server

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

A.

Internet layer

B.

Application layer

C.

Transport Layer

D.

Link layer

You want to search Microsoft Outlook Web Access Default Portal using Google search on the

Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?

A.

intitle:index.of inbox dbx

B.

intext:"outlook.asp"

C.

allinurl:"exchange/logon.asp"

D.

intitle:"Index Of" -inurl:maillog maillog size

Which of the following Penetration Testing steps includes network mapping and OS fingerprinting?

A.

Gather information

B.

Exploit

C.

Verify vulnerabilities

D.

Planning stage

Page: 1 / 6
Total 385 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved