giac GPEN Exam Questions

Questions for the GPEN were updated on : Nov 21 ,2025

Page 1 out of 26. Viewing questions 1-15 out of 391

Question 1

Which of the following does NOT use a proxy software to protect users?

  • A. Stateful inspection
  • B. Packet filtering
  • C. Application layer gateway
  • D. Circuit level proxy server
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following tasks is NOT performed by antiviruses?

  • A. Activity blocking
  • B. Heuristic scanning
  • C. Integrity scanning
  • D. Session hijacking
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following tools is not a BlueSnarf attacking tool?

  • A. Blooover
  • B. Redsnarf
  • C. BlueSnarfer
  • D. Freejack
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following tools is an example of HIDS?

  • A. Anti-Spector
  • B. Auditpol.exe
  • C. Elsave
  • D. Log File Monitor
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following statements about SSID is NOT true?

  • A. Default settings of SSIDs are secure.
  • B. All wireless devices on a wireless network must have the same SSID in order to communicate with each other.
  • C. It acts as a password for network access.
  • D. It is used to identify a wireless network.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating
system?

  • A. Aeropeek
  • B. Kismet
  • C. Airsnort
  • D. Void11
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following is the correct syntax to create a null session?

  • A. c:\>net view \\IP_addr\IPC$ "" /u: ""
  • B. c:\>net view \\IPC$\IP_addr "" /u: ""
  • C. c:\>net use \\IP_addr\IPC$ "" /u: ""
  • D. c:\>net use \\IPC$\IP_addr "" /u: ""
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following is NOT a Back orifice plug-in?

  • A. BOSOCK32
  • B. STCPIO
  • C. BOPeep
  • D. Beast
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following TCSEC classes defines verified protection?

  • A. Class B
  • B. Class D
  • C. Class A
  • D. Class C
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following ports is used for NetBIOS null sessions?

  • A. 130
  • B. 139
  • C. 143
  • D. 131
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following event logs contains traces of brute force attempts performed by an attacker?

  • A. SysEvent.Evt
  • B. WinEvent.Evt
  • C. AppEvent.Evt
  • D. SecEvent.Evt
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following statements about Fport is true?

  • A. It works as a process viewer.
  • B. It works as a datapipe on Windows.
  • C. It works as a datapipe on Linux.
  • D. It is a source port forwarder/redirector.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following is an open source Web scanner?

  • A. Nikto
  • B. GFI LANguird
  • C. NetRecon
  • D. Internet scanner
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following tools is based on the SATAN tool?

  • A. Retina
  • B. Internet scanner
  • C. GFI LANguard
  • D. SAINT
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following tasks is NOT performed into the enumeration phase?

  • A. Discovering NetBIOS names
  • B. Obtaining Active Directory information and identifying vulnerable user accounts
  • C. Injecting a backdoor to the remote computer to gain access in it remotely
  • D. Establishing NULL sessions and queries
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2