100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS 560 ~ GPEN EXAM 2025 WITH 100% ACCURATE SOLUTIONS

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
05-07-2025
Written in
2024/2025

Which of the following correctly defines the Nmap Scripting Engine “intrusive” category?   Detects network-accessible backdoors   Looks for a vulnerability   Detects the version of a target’s services   May leave logs, guess passwords, or otherwise impact the target – Answer May leave logs, guess passwords, or otherwise impact the target   After scanning a network, a penetration tester has a list of open ports to be investigated. Which Nmap feature can be used to probe the target machine and determine what software is actually listening on those ports?   TCP connect scan   Version scanning   UDP port scan   TCP SYN scan – Answer Version scanning   A penetration tester executes the command “dnsrecon -d [domain] -t axfr” to target the DNS infrastructure of an organization. What are they doing?   Attempting a zone transfer   Performing a DNSSEC zone walk   Performing a reverse DNS lookup for IPaddress or CIDRrange   Scanning for DNS cache snooping using a supplied dictionary file – Answer Attempting a zone transfer  

Show more Read less
Institution
SANS 560 ~ GPEN 
Course
SANS 560 ~ GPEN 











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS 560 ~ GPEN 
Course
SANS 560 ~ GPEN 

Document information

Uploaded on
July 5, 2025
Number of pages
39
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS 560 ~ GPEN EXAM 2025 WITH 100%
ACCURATE SOLUTIONS




Which of the following correctly defines the Nmap Scripting Engine
“intrusive” category?



Detects network-accessible backdoors



Looks for a vulnerability



Detects the version of a target’s services



May leave logs, guess passwords, or otherwise impact the target – Answer
May leave logs, guess passwords, or otherwise impact the target



After scanning a network, a penetration tester has a list of open ports to
be investigated. Which Nmap feature can be used to probe the target
machine and determine what software is actually listening on those ports?



TCP connect scan



Version scanning



UDP port scan



TCP SYN scan – Answer Version scanning

,A penetration tester executes the command “dnsrecon -d [domain] -t
axfr” to target the DNS infrastructure of an organization. What are they
doing?



Attempting a zone transfer



Performing a DNSSEC zone walk



Performing a reverse DNS lookup for IPaddress or CIDRrange



Scanning for DNS cache snooping using a supplied dictionary file – Answer
Attempting a zone transfer



Which Regional Internet Registry is responsible for Europe, the Middle
East, and parts of Central Asia?



RIPE NCC



ARIN



LACNIC



APNIC – Answer RIPE NCC



Which of the following implies that you are measuring things against a
fixed, pre-determined, rigorous set of standards?



Penetration testing



Vulnerability scan

,Security audit



Security assessment – Answer Security audit



In retaliation for being fired, a former employee wants to cause a network
outage in an organization. What is the former employee an example of?



Risk



Threat



Exploit



Vulnerability – Answer Threat



During a penetration testing engagement, the tester poses as a targeted
user to a call center operator and requests that the user’s password be
changed. What sort of penetration test is being performed?



Network services test



Web application test



Client-side test



Social engineering test – Answer Social engineering test



What is the default -T speed used by Nmap when scanning a target?



3

, 1



2



4 – Answer 3



An organization is contracted to perform an external penetration test on a
very large target network. Which technique would be most effective to
limit the scope of the scanning needed to identify targets?



Scan using Nessus unsafe plugins.



Scan using a TCP SYN scan for all ports.



Scan using a TCP connect scan for all ports.



Scan a subset of commonly used ports. – Answer Scan a subset of
commonly used ports.



Upon gaining access to a Linux host, what directory could be useful to
review for interesting files such as account information and hashes?



Root



Etc



Passwd



Home – Answer ect

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
YANCHY Herzing University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1740
Member since
3 year
Number of followers
1159
Documents
23169
Last sold
9 hours ago
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Read more Read less
4.1

447 reviews

5
251
4
58
3
85
2
18
1
35

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions