Question 25

- (Topic 3)
One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PDA. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?

Correct Answer:B

Question 26

- (Topic 3)
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Correct Answer:A

Question 27

- (Topic 2)
Which of the following tools allow you to perform HTTP tunneling?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 28

- (Topic 4)
Which of the following tools can be used to find a username from a SID?

Correct Answer:C

Question 29

- (Topic 1)
Why is it important to have a cheat sheet reference of database system tables when performing SQL Injection?

Correct Answer:D
Reference: http://www.rackspace.com/knowledge_center/article/sql-injection-in-mysql

Question 30

- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

Correct Answer:D

START GPEN EXAM