Free GPEN Exam Dumps

Question 26

- (Topic 4)
What does TCSEC stand for?

Correct Answer:A

Question 27

- (Topic 3)
Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Correct Answer:C

Question 28

- (Topic 2)
You run the following PHP script:

What is the use of the mysql_real_escape_string() function in the above script. Each correct answer represents a complete solution. Choose all that apply

Correct Answer:AD

Question 29

- (Topic 4)
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ACD

Question 30

CORRECT TEXT - (Topic 2)
Write the appropriate attack name to fill in the blank.
In a _____________ DoS attack, the attacker sends a spoofed TCP SYN packet in which the IP address of the target is filled in both the source and destination fields.

Correct Answer:land