100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS 560 GPEN EXAM WITH QUESTIONS AND WELL VERIFIED ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+ || LATEST VERSION 2025

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
09-10-2025
Written in
2025/2026

SANS 560 GPEN EXAM WITH QUESTIONS AND WELL VERIFIED ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+ || LATEST VERSION 2025 What is the name of the special TGT created by an attacker after compromising the AD KRBTGT account? A. AD Ticket B. Kerberos Ticket C. Golden Ticket D. Silver Ticket - ANSWER-C. Golden Ticket What is the name of the file on the domain controller that contains the AD database, including encrypted data such as usernames and password hashes? A. B. C. D. - ANSWER-B. What is Azure AD's main flow type for authentication? A. Kerberos B. LDAP C. NTLM D. OpenID Connect - ANSWER-D. OpenID Connect An Azure access token must be periodically refreshed. Where will the user send the refresh token? A. Azure Portal B. Azure IdP C. Azure AD D. MSOL - ANSWER-C. Azure AD After retrieving a .pfx certificate as part of the ESC1 attack, what tool can be used to recover the NT hash from other accounts? A. SharpRoast B. Certipy C. Seatbelt D. SharpUp - ANSWER-B. Certipy What is the technique that uses the hash form of a password to access the target system directly, instead of cracking the password? A. Hash dump B. Pass-the-hash C. Crack-the-hash D. Hash attack - ANSWER-B. Pass-the-hash Which of the following Sysinternals tools can you use to first transfer a file from one Windows computer to another, and then run it on the remote computer? A. PsExec B. movefile C. autoruns D. logonsessions - ANSWER-A. PsExec Within the Metasploit Framework, what type of modules are associated with scanning for vulnerable systems and launching denial-of-service attacks? A. Payloads B. Encoders C. Auxiliary D. Modules - ANSWER-C. Auxiliary

Show more Read less
Institution
SANS 560 GPEN
Course
SANS 560 GPEN











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS 560 GPEN
Course
SANS 560 GPEN

Document information

Uploaded on
October 9, 2025
Number of pages
40
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS 560 GPEN EXAM WITH QUESTIONS AND
WELL VERIFIED ANSWERS|| GUARANTEED
PASS|| ALREADY GRADED A+ || LATEST
VERSION 2025




What is the name of the special TGT created by an attacker after compromising
the AD KRBTGT account?


A. AD Ticket
B. Kerberos Ticket
C. Golden Ticket
D. Silver Ticket - ANSWER-C. Golden Ticket


What is the name of the file on the domain controller that contains the AD
database, including encrypted data such as usernames and password hashes?


A. adcreds.dit
B. ntds.dit
C. forest.dit
D. sysnt.dit - ANSWER-B. ntds.dit


What is Azure AD's main flow type for authentication?


A. Kerberos

,B. LDAP
C. NTLM
D. OpenID Connect - ANSWER-D. OpenID Connect


An Azure access token must be periodically refreshed. Where will the user send
the refresh token?


A. Azure Portal
B. Azure IdP
C. Azure AD
D. MSOL - ANSWER-C. Azure AD


After retrieving a .pfx certificate as part of the ESC1 attack, what tool can be
used to recover the NT hash from other accounts?


A. SharpRoast
B. Certipy
C. Seatbelt
D. SharpUp - ANSWER-B. Certipy


What is the technique that uses the hash form of a password to access the target
system directly, instead of cracking the password?


A. Hash dump
B. Pass-the-hash
C. Crack-the-hash
D. Hash attack - ANSWER-B. Pass-the-hash

,Which of the following Sysinternals tools can you use to first transfer a file
from one Windows computer to another, and then run it on the remote
computer?


A. PsExec
B. movefile
C. autoruns
D. logonsessions - ANSWER-A. PsExec


Within the Metasploit Framework, what type of modules are associated with
scanning for vulnerable systems and launching denial-of-service attacks?


A. Payloads
B. Encoders
C. Auxiliary
D. Modules - ANSWER-C. Auxiliary


What is the result of running the following command?C:\> net localgroup
administrators fred /del


A. Fred is deleted from the administrators group.
B. The fred account is deleted from the system.
C. Fred is deleted from the localgroup and administrators group.
D. The administrators group and fred group are deleted. - ANSWER-A. Fred is
deleted from the administrators group.


While using Empire in post-exploitation, a penetration tester wishes to perform
a simulated attempt to send data out from the environment to see if the client
Incident Response or blue teams identify it. In which category of Empire
modules should they look for this functionality?

, A. Exploitation
B. Fun
C. Lateral movement
D. Exfiltration - ANSWER-D. Exfiltration




A penetration tester has gained access to a Linux machine and would like to
collect information about machines with which the compromised machine is
currently communicating with. Which of the following commands will provide
this information?


A. nmap -sS <targetIP>
B. ss -t state established
C. ipconfig /all
D. hostname - ANSWER-B. ss -t state established




MSBuild accepts code in which format to execute inline tasks for bypassing
application control?


A. CSV
B. XML
C. JSON
D. TXT - ANSWER-B. XML


Which of the following is most commonly the primary access mechanism for
Linux systems?
$22.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
martinmwambingu54
4.0
(1)

Get to know the seller

Seller avatar
martinmwambingu54 Johns Hopkins University
View profile
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
5 months
Number of followers
1
Documents
854
Last sold
1 month ago
A+ EXAM ARCHIVES YOUR BLUEPRINT FOR ACADEMIC SUCCESS!

Welcome to A+ EXAM ARCHIVES – Your New Frontier for Academic Success on Stuvia! We\'re pioneering a fresh approach to study resources. We\'re dedicated to bringing you meticulously engineered, verified study solutions designed to unlock your full potential and drive remarkable academic success. Our commitment is clear: to provide cutting-edge content that is not only exceptionally clear and accurate but also strategically optimized to streamline your learning process. Whether you\'re aiming to master complex concepts, prepare for upcoming challenges, or simply seeking intelligent, reliable study tools, our curated collection of next-gen notes, agile summaries, and comprehensive learning frameworks is built to give you a distinct advantage. We understand that today\'s students need more than just information – they need effective, innovative solutions. That\'s why every document we create is thoughtfully developed to meet your specific learning requirements, ensuring you have the powerful tools to navigate your academic journey with absolute confidence. Join us at the forefront of smarter studying. Explore our store today and be among the first to experience a new level of academic support. Activate your A+ potential now!

Read more Read less
4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions