Questions for the GPEN were updated on : Nov 21 ,2025
Which of the following does NOT use a proxy software to protect users?
D
Which of the following tasks is NOT performed by antiviruses?
D
Which of the following tools is not a BlueSnarf attacking tool?
D
Which of the following tools is an example of HIDS?
D
Which of the following statements about SSID is NOT true?
A
Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating
system?
A
Which of the following is the correct syntax to create a null session?
C
Which of the following is NOT a Back orifice plug-in?
D
Which of the following TCSEC classes defines verified protection?
C
Which of the following ports is used for NetBIOS null sessions?
B
Which of the following event logs contains traces of brute force attempts performed by an attacker?
D
Which of the following statements about Fport is true?
A
Which of the following is an open source Web scanner?
A
Which of the following tools is based on the SATAN tool?
D
Which of the following tasks is NOT performed into the enumeration phase?
C