لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Analyze the command output below. What information can the tester infer directly from the Information shown? [GIAC-GPEN-8.0/GIAC-GPEN-4_2.png]
A. Usernames for the domain tesrdomain
B. Directory indexing is allowed on the web server
C. Vulnerable versions of Adobe software in use
D. Naming convention for public documents
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which of the following wireless security features provides the best wireless security mechanism?
A. WPA with Pre Shared Key
B. WPA
C. WEP
D. WPA with 802
عرض الإجابة
اجابة صحيحة: D
السؤال #3
You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly change directories to where the Windows operating system resides, what command could you use?
A. cd systemroot
B. cd-
C. cd /systemroot/
D. cd %systemroot%
عرض الإجابة
اجابة صحيحة: B
السؤال #4
You work as a Network Administrator for McNeil Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks: The wireless network communication should be secured. The laptop use
A. Eavesdropping
B. War driving
C. Sniffing
D. Banner grabbing
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening port of the attacker's choosing on the victim machine?
A. Vncinject/find
B. Vncinject/reverse
C. Vncinject/reverse-http
D. Vncinject /bind
عرض الإجابة
اجابة صحيحة: B
السؤال #6
While scanning a remote system that is running a web server with a UDP scan and monitoring the scan with a sniffer, you notice that the target is responding with ICMP Port Unreachable only once a second What operating system is the target likely running?
A. Linux
B. Windows
C. OpenBSD
D. Mac OS X
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which of the following describes the direction of the challenges issued when establishing a wireless (IEEE 802.11) connection?
A. One-way, the client challenges the access point
B. One-way, the access point challenges the client
C. No challenges occur (or wireless connection
D. Two-way, both the client and the access point challenge each other
عرض الإجابة
اجابة صحيحة: D
السؤال #8
What is the impact on pre-calculated Rainbow Tables of adding multiple salts to a set of passwords?
A. Salts increases the time to crack the original password by increasing the number oftables that must be calculated
B. Salts double the total size of a rainbow table database
C. Salts can be reversed or removed from encoding quickly to produce unsaltedhashes
D. Salts have little effect because they can be calculated on the fly with applicationssuch as Ophcrack
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You work as a professional Ethical Hacker. You are assigned a project to perform blackhat testing on www.we-are-secure.com. You visit the office of we-are-secure.com as an air-condition mechanic. You claim that someone from the office called you saying that there is some fault in the air-conditioner of the server room. After some inquiries/arguments, the Security Administrator allows you to repair the air-conditioner of the server room. When you get into the room, you found the server is Linux-based. You pr
A. Placing BIOS password
B. Encrypting disk partitions
C. Using password protected hard drives
D. Setting only the root level access for sensitive data
عرض الإجابة
اجابة صحيحة: BC
السؤال #10
If the privacy bit is set in the 802.11 header, what does it indicate?
A. SSID cloaking is being used
B. Some form of encryption is In use
C. WAP is being used
D. Some form of PEAP is being used
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following is possible in some SQL injection vulnerabilities on certain types of databases that affects the underlying server OS?
A. Database structure retrieval
B. Shell command execution
C. Data manipulation
D. Data query capabilities
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Approximately how many packets are usually required to conduct a successful FMS attack onWEP?
A. 250
B. 20
C. 10
D. l (with a weak IV)
عرض الإجابة
اجابة صحيحة: B
السؤال #13
What command will correctly reformat the Unix passwordcopy and shadowcopy Tiles for input to John The Ripper?
A. /Un shadow passwd copy shadowcopy > johnfile
B. /Unshadow passwdcopy shadowcopy > johnfile
C. /Unshadow shadowcopy passwdcopy >john file
D. /Unshadow passwdcopy shadowcopy > johnfile
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: