Free GPEN Exam Dumps

Question 16

- (Topic 4)
The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BD

Question 17

- (Topic 4)
Which of the following Trojans does not use TCP protocol?

Correct Answer:C

Question 18

- (Topic 4)
Which of the following tools is used for port redirection?

Correct Answer:B

Question 19

- (Topic 2)
What happens when you scan a broadcast IP address of a network?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:CD

Question 20

- (Topic 1)
You are conducting a penetration test for a private contractor located in Singapore. The scope extends to all internal hosts controlled by the company, you have gathered necessary hold-harmless and nondisclosure agreements. Which action by your group can incur criminal liability under Chapter 50a, Computer Misuse Act?

Correct Answer:D