Free GPEN Exam Dumps

Question 51

- (Topic 2)
Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Correct Answer:B

Question 52

- (Topic 4)
Which of the following tools can be used to find a username from a SID?

Correct Answer:C

Question 53

- (Topic 3)
Which of the following tools are used for footprinting?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

Question 54

- (Topic 1)
You are pen testing a network and have shell access to a machine via Netcat. You try to use ssh to access another machine from the first machine. What is the expected result?

Correct Answer:C

Question 55

- (Topic 4)
Which of the following is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards and also detects wireless networks marking their relative position with a GPS?

Correct Answer:B