Question 31

- (Topic 2)
You want to create a binary log file using tcpdump. Which of the following commands will you use?

Correct Answer:C

Question 32

- (Topic 2)
Which of the following Web authentication techniques uses a single sign-on scheme?

Correct Answer:B

Question 33

- (Topic 4)
Which of the following tools is used for port redirection?

Correct Answer:B

Question 34

- (Topic 4)
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ACD

Question 35

- (Topic 4)
Which of the following tasks is NOT performed into the enumeration phase?

Correct Answer:C

Question 36

- (Topic 4)
Which of the following are the countermeasures against WEP cracking?
Each correct answer represents a part of the solution. Choose all that apply.

Correct Answer:ACD

START GPEN EXAM