Free GPEN Exam Dumps

Question 61

- (Topic 3)
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Correct Answer:A

Question 62

CORRECT TEXT - (Topic 4)
Fill in the blank with the appropriate act name.
The ____act gives consumers the right to ask emailers to stop spamming them.

Correct Answer:CAN-SPAM

Question 63

- (Topic 2)
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
It is commonly used for the following purposes:
:a. War driving
:b. Detecting unauthorized access points
:c. Detecting causes of interference on a WLAN
:d. WEP ICV error tracking
:e. Making Graphs and Alarms on 802.11 Data, including Signal Strength
This tool is known as __________.

Correct Answer:C

Question 64

- (Topic 3)
Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

Correct Answer:A

Question 65

- (Topic 1)
The resulting business impact, of the penetration test or ethical hacking engagement is explained in what section of the final report?

Correct Answer:D
Reference:
http://www.frost.com/upld/get-data.do?id=1568233