Free GPEN Exam Dumps

Question 86

- (Topic 3)
John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.
Recently, John's company has got a project to test the security of a promotional Website
www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:
[removed]alert('Hi, John')[removed]
After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."
Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Correct Answer:A

Question 87

- (Topic 3)
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. You install access points for enabling a wireless network. The sales team members and the managers in the company will be using laptops to connect to the LAN through wireless connections. Therefore, you install WLAN network interface adapters on their laptops. However, you want to restrict the sales team members and managers from communicating directly to each other. Instead, they should communicate through the access points on the network. Which of the following topologies will you use to accomplish the task?

Correct Answer:C

Question 88

- (Topic 3)
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.

Correct Answer:CD

Question 89

- (Topic 1)
You are conducting a penetration test for a private company located in the UK. The scope
extends to all internal and external hosts controlled by the company. You have gathered necessary hold-harmless and non-disclosure agreements. Which action by your group can incur criminal liability under the computer Misuse Act of 1990?

Correct Answer:B

Question 90

- (Topic 1)
Why is OSSTMM beneficial to the pen tester?

Correct Answer:C
Reference:
http://www.pen-tests.com/open-source-security-testing-methodology-manual-osstmm.html