Free GPEN Exam Dumps

Question 56

- (Topic 1)
When attempting to crack a password using Rainbow Tables, what is the output of the
reduction function?

Correct Answer:D
Reference:
http://en.wikipedia.org/wiki/Rainbow_table

Question 57

- (Topic 1)
A customer has asked for a scan or vulnerable SSH servers. What is the penetration tester attempting to accomplish using the following Nmap command?
GPEN dumps exhibit

Correct Answer:D

Question 58

- (Topic 2)
Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?

Correct Answer:A
Reference:
http://nmap.org/book/vscan.html

Question 59

- (Topic 3)
GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which
of the following cryptographic attacks can be used to break both ciphers?

Correct Answer:B

Question 60

- (Topic 4)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
GPEN dumps exhibit
Which of the following tools is John using to crack the wireless encryption keys?

Correct Answer:B