SANS GPEN

Exit

Question 1 of 1

  Time Left


0 [{"id":183331,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 23:26:21","updated_at":"2017-03-28 23:26:21","questionName":"Analyze the screenshot below. What event is depicted?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/sans-gpen\/q5.png","position":null,"explanation":"If a session failed error is received, either the target is not vulnerable to the exploit in question or the payload is not designed to launch an interactive session.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181787,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 12:51:28","updated_at":"2017-03-24 12:51:28","questionName":"You are performing an external penetration test for a client and want your scan to go unnoticed by the target systems. Analyze the screen shot and determine what scan setting should be changed before you begin your Nessus scan.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/sans-gpen\/Q2.jpg","position":null,"explanation":"You should perform a SYN scan instead of a TCP scan. TCP scans are more likely to be logged and noticed because they complete the TCP handshake. Pinging all the hosts or reducing the Port Scan Range will not decrease the possibility of your scan being not","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":189485,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-04-11 23:41:00","updated_at":"2017-04-11 23:41:00","questionName":"1.\tHow can the \u201crobots.txt\u201d file be helpful when performing reconnaissance?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"The robots.txt tells well-behaved crawlers what directories and files to ignore. Possibly because it is sensitive. Attackers often focus on the directories and files listed in robots.txt because they may include some juicy information.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":183333,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 23:31:04","updated_at":"2017-03-28 23:31:04","questionName":"What file does John the Ripper store its current status in so that it can resume operation where it left off if it crashes?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Every ten minutes, John updates a file in its run directory called john.rec. a recovery file in the event of a crash. Also, if you hit CTRLC while john is running, it will update the john.rec file before it exists. If you hit CTRL_C twice quickly, John wi","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181794,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 12:56:58","updated_at":"2017-03-24 12:56:58","questionName":"You are using the Nmap Scripting Engine and want detailed output of the script as it runs. Which option do you include in the command string? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Use the \u2013script-trace option to include detailed output of Nmap Scripting Engine scripts. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181790,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 12:54:37","updated_at":"2017-03-24 12:54:37","questionName":"Finding and reporting vulnerabilities in a system without the intent to exploit them is an example of what practice?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181789,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 12:53:13","updated_at":"2017-03-24 12:53:13","questionName":"Analyze the screenshot below. What correct conclusion can be made about the target?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/sans-gpen\/Q3.png","position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":183332,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 23:28:00","updated_at":"2017-03-28 23:28:00","questionName":"What can be done to alter firewalls rules to speed port scanning?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Alter firewall rules for closed ports: Target organization personnel could alter firewall rules to send TCP RESET messages for closed TCP ports and ICMP Port Unreachable messages for closed UDP ports, which will prevent most scanning tools from waiting fo","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181800,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 13:00:13","updated_at":"2017-03-24 13:00:13","questionName":"You are using THC-hydra for password guessing and want to create a custom policydictionary.txt file that matches an organization\u2019s password policy requiring 8 or more characters and at least two of the following: uppercase letters, one lowercase letters and numbers. Which of the following commands will accomplish this task? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":183335,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 23:34:25","updated_at":"2017-03-28 23:34:25","questionName":"1.\tDuring a pen test you have acquired a file called pix.dump. This file appears to be the output of the \u201cshow run\u201d command which dumps the running config for the firewall. You notice a line below and suspect that the administrators have used a common term as a password. enable password 8Ry2Yjlyt7RRXU24 encrypted Which of the following techniques could be used to unmask the password?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"There are some times during a penetration test that making educated guesses are worth while. Creating a list of commonly used terms for an organization and using the hash generator for Cain is one method for cracking or reverse engineering device password","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181798,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 12:58:39","updated_at":"2017-03-24 12:58:39","questionName":"You are conducting a pen test. You are given limited information on the site. This information is restricted to a system host name. What type of test are you conducting? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":183334,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 23:32:39","updated_at":"2017-03-28 23:32:39","questionName":"You are scheduling web application vulnerability testes against several environments using your favorite tool, Nikto. Which of the following environments would result in an inaccurate test result when scanning with Nikto?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Nikto is helpful for web application scanning, but is invalid against custom environments. Nikto can analyze web traffic for common web applications, but does not return accurate results for custom web applications.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":183317,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 20:38:54","updated_at":"2017-03-28 20:38:54","questionName":"By default, which protocol do Linux and Unix systems use to transfer packets for tracing a network path? ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"The Linux and Unix traceroute command utilized UDP messages with varying destination ports as its probe messages to elicit ICMP TTL Exceeded in Transit messages. As it starting point, traceroute\u2019s default behavior begins with a UDP port of 33434, to which","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":183329,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-28 23:23:50","updated_at":"2017-03-28 23:23:50","questionName":"The resulting business impact of the penetration test or ethical hacking engagement is explained in what section of the final report?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"You need to explain the business impact of your findings in the Executive Summary. You can use a bulleted list of the biggest three to six findings, followed by several sentences that explain the business impact in terms of risk for each finding. Focus on","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":181793,"quiz_id":"11050","answer_id":null,"answerType_id":"0","created_at":"2017-03-24 12:55:33","updated_at":"2017-03-24 12:55:33","questionName":"Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
183331
0
120
block

Analyze the screenshot below. What event is depicted?

Select the correct answer(s).  

(0/0)














181787
0
120
none
189485
0
120
none
183333
0
120
none
181794
0
120
none
181790
0
120
none
181789
0
120
none
183332
0
120
none
181800
0
120
none
183335
0
120
none
181798
0
120
none
183334
0
120
none
183317
0
120
none
183329
0
120
none
181793
0
120
none