GIAC Certified Penetration Tester Exam Practice Test

Page: 1 / 14
Total 391 questions
Question 1

Which of the following tasks is NOT performed by antiviruses?



Answer : D


Question 2

Which of the following is an open source Web scanner?



Answer : A


Question 3

Which of the following tools is based on the SATAN tool?



Answer : D


Question 4

Which of the following tasks is NOT performed into the enumeration phase?



Answer : C


Question 5

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?



Answer : D


Question 6

LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.



Answer : A


Question 7

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?



Answer : C


Page:    1 / 14   
Total 391 questions