Want to pass your GIAC Certified Penetration Tester GPEN exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
What is the purpose of the following command?
C:\>wmic /node:[target IP] /user:[admin-user] /password:[password] process call create [command]
A. Running a command on a remote Windows machine
B. Creating a service on a remote Windows machine
C. Creating an admin account on a remote Windows machine
D. Listing the running processes on a remote windows machine
How does OWASP ZAP function when used for performing web application assessments?
A. It is a non-transparent proxy that sits between your web browser and the targetapplication.
B. It is a transparent policy proxy that sits between Java servers and |SP web pages.
C. It is a non-transparent proxy that passively sniffs network traffic for HTTPvulnerabilities.
D. It is a transparent proxy that sits between a target application and the backenddatabase.
Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?
A. Adam is using NTFS file system.
B. Alternate Data Streams is a feature of Linux operating system.
C. Adam is using FAT file system.
D. Adam's system runs on Microsoft Windows 98 operating system.