GIAC GPEN Exam Practice Questions (P. 1)
- Full Access (385 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch at Tokyo and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel they can use?
send
light_mode
delete
Question #2
Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?
- AVncinject/find.lag
- BVncinject/reverse.tcp
- CVncinject/reverse-http
- DVncinject /bind.tcp
Correct Answer:
B
Reference:
http://www.rapid7.com/db/modules/payload/windows/vncinject/reverse_tcp
B
Reference:
http://www.rapid7.com/db/modules/payload/windows/vncinject/reverse_tcp
send
light_mode
delete
Question #3
What is the MOST important document to obtain before beginning any penetration testing?
- AProject plan
- BExceptions document
- CProject contact list
- DA written statement of permissionMost Voted
Correct Answer:
A
Reference:
Before starting a penetration test, all targets must be identified. These targets should be obtained from the customer during the initial questionnaire phase. Targets can be given in the form of specific IP addresses, network ranges, or domain names by the customer. In some instances, the only target the customer provides is the name of the organization and expects the testers be able to identify the rest on their own. It is important to define if systems like firewalls and IDS/IPS or networking equipment that are between the tester and the final target are also part of the scope. Additional elements such as upstream providers, and other 3rd party providers should be identified and defined whether they are in scope or not.
A
Reference:
Before starting a penetration test, all targets must be identified. These targets should be obtained from the customer during the initial questionnaire phase. Targets can be given in the form of specific IP addresses, network ranges, or domain names by the customer. In some instances, the only target the customer provides is the name of the organization and expects the testers be able to identify the rest on their own. It is important to define if systems like firewalls and IDS/IPS or networking equipment that are between the tester and the final target are also part of the scope. Additional elements such as upstream providers, and other 3rd party providers should be identified and defined whether they are in scope or not.
send
light_mode
delete
Question #4
While reviewing traffic from a tcpdump capture, you notice the following commands being sent from a remote system to one of your web servers:
C:\>sc winternet.host.com create ncservicebinpath- "c:\tools\ncexe -I -p 2222 -e cmd.exe"
C:\>sc vJnternet.host.com query ncservice.
What is the intent of the commands?
C:\>sc winternet.host.com create ncservicebinpath- "c:\tools\ncexe -I -p 2222 -e cmd.exe"
C:\>sc vJnternet.host.com query ncservice.
What is the intent of the commands?
- AThe first command creates a backdoor shell as a service. It is being started on TCP2222 using cmd.exe. The second command verifies the service is created and itsstatus.Most Voted
- BThe first command creates a backdoor shell as a service. It is being started on UDP2222 using cmd.exe. The second command verifies the service is created and itsstatus.
- CThis creates a service called ncservice which is linked to the cmd.exe command andits designed to stop any instance of nc.exe being run. The second command verifiesthe service is created and its status.
- DThe first command verifies the service is created and its status. The secondcommand creates a backdoor shell as a service. It is being started on TCP
Correct Answer:
C
C
send
light_mode
delete
Question #5
Which of the following best describes a client side exploit?
- AAttack of a client application that retrieves content from the network
- BAttack that escalates user privileged to root or administrator
- CAttack of a service listening on a client system
- DAttack on the physical machine
Correct Answer:
C
C
send
light_mode
delete
Question #6
Which of the following TCP packet sequences are common during a SYN (or half-open) scan?
send
light_mode
delete
Question #7
Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?
- AOne-way, the client challenges the access point
- BOne-way, the access point challenges the client
- CNo challenges occur (or wireless connection
- DTwo-way, both the client and the access point challenge each other
Correct Answer:
D
D
send
light_mode
delete
Question #8
You have gained shell on a Windows host and want to find other machines to pivot to, but the rules of engagement state that you can only use tools that are already available. How could you find other machines on the target network?
- AUse the "ping" utility to automatically discover other hosts
- BUse the "ping" utility in a for loop to sweep the network.
- CUse the "edit" utility to read the target's HOSTS file.
- DUse the "net share" utility to see who is connected to local shared drives.
Correct Answer:
B
Reference:
http://www.slashroot.in/what-ping-sweep-and-how-do-ping-sweep
B
Reference:
http://www.slashroot.in/what-ping-sweep-and-how-do-ping-sweep
send
light_mode
delete
Question #9
A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?
- AUse the http service's PUT command to push the file onto the target machine.
- BUse the scp service, protocol SSHv2 to pull the file onto the target machine.
- CUse the telnet service's ECHO option to pull the file onto the target machine
- DUse the ftp service in passive mode to push the file onto the target machine.
Correct Answer:
D
D
send
light_mode
delete
Question #10
What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?
send
light_mode
delete
All Pages