100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SANS 560 GPEN EXAM WITH QUESTIONS AND WELL VERIFIED ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+ || LATEST VERSION 2025

Puntuación
-
Vendido
-
Páginas
40
Grado
A+
Subido en
09-10-2025
Escrito en
2025/2026

SANS 560 GPEN EXAM WITH QUESTIONS AND WELL VERIFIED ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+ || LATEST VERSION 2025 What is the name of the special TGT created by an attacker after compromising the AD KRBTGT account? A. AD Ticket B. Kerberos Ticket C. Golden Ticket D. Silver Ticket - ANSWER-C. Golden Ticket What is the name of the file on the domain controller that contains the AD database, including encrypted data such as usernames and password hashes? A. B. C. D. - ANSWER-B. What is Azure AD's main flow type for authentication? A. Kerberos B. LDAP C. NTLM D. OpenID Connect - ANSWER-D. OpenID Connect An Azure access token must be periodically refreshed. Where will the user send the refresh token? A. Azure Portal B. Azure IdP C. Azure AD D. MSOL - ANSWER-C. Azure AD After retrieving a .pfx certificate as part of the ESC1 attack, what tool can be used to recover the NT hash from other accounts? A. SharpRoast B. Certipy C. Seatbelt D. SharpUp - ANSWER-B. Certipy What is the technique that uses the hash form of a password to access the target system directly, instead of cracking the password? A. Hash dump B. Pass-the-hash C. Crack-the-hash D. Hash attack - ANSWER-B. Pass-the-hash Which of the following Sysinternals tools can you use to first transfer a file from one Windows computer to another, and then run it on the remote computer? A. PsExec B. movefile C. autoruns D. logonsessions - ANSWER-A. PsExec Within the Metasploit Framework, what type of modules are associated with scanning for vulnerable systems and launching denial-of-service attacks? A. Payloads B. Encoders C. Auxiliary D. Modules - ANSWER-C. Auxiliary

Mostrar más Leer menos
Institución
SANS 560 GPEN
Grado
SANS 560 GPEN











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SANS 560 GPEN
Grado
SANS 560 GPEN

Información del documento

Subido en
9 de octubre de 2025
Número de páginas
40
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SANS 560 GPEN EXAM WITH QUESTIONS AND
WELL VERIFIED ANSWERS|| GUARANTEED
PASS|| ALREADY GRADED A+ || LATEST
VERSION 2025




What is the name of the special TGT created by an attacker after compromising
the AD KRBTGT account?


A. AD Ticket
B. Kerberos Ticket
C. Golden Ticket
D. Silver Ticket - ANSWER-C. Golden Ticket


What is the name of the file on the domain controller that contains the AD
database, including encrypted data such as usernames and password hashes?


A. adcreds.dit
B. ntds.dit
C. forest.dit
D. sysnt.dit - ANSWER-B. ntds.dit


What is Azure AD's main flow type for authentication?


A. Kerberos

,B. LDAP
C. NTLM
D. OpenID Connect - ANSWER-D. OpenID Connect


An Azure access token must be periodically refreshed. Where will the user send
the refresh token?


A. Azure Portal
B. Azure IdP
C. Azure AD
D. MSOL - ANSWER-C. Azure AD


After retrieving a .pfx certificate as part of the ESC1 attack, what tool can be
used to recover the NT hash from other accounts?


A. SharpRoast
B. Certipy
C. Seatbelt
D. SharpUp - ANSWER-B. Certipy


What is the technique that uses the hash form of a password to access the target
system directly, instead of cracking the password?


A. Hash dump
B. Pass-the-hash
C. Crack-the-hash
D. Hash attack - ANSWER-B. Pass-the-hash

,Which of the following Sysinternals tools can you use to first transfer a file
from one Windows computer to another, and then run it on the remote
computer?


A. PsExec
B. movefile
C. autoruns
D. logonsessions - ANSWER-A. PsExec


Within the Metasploit Framework, what type of modules are associated with
scanning for vulnerable systems and launching denial-of-service attacks?


A. Payloads
B. Encoders
C. Auxiliary
D. Modules - ANSWER-C. Auxiliary


What is the result of running the following command?C:\> net localgroup
administrators fred /del


A. Fred is deleted from the administrators group.
B. The fred account is deleted from the system.
C. Fred is deleted from the localgroup and administrators group.
D. The administrators group and fred group are deleted. - ANSWER-A. Fred is
deleted from the administrators group.


While using Empire in post-exploitation, a penetration tester wishes to perform
a simulated attempt to send data out from the environment to see if the client
Incident Response or blue teams identify it. In which category of Empire
modules should they look for this functionality?

, A. Exploitation
B. Fun
C. Lateral movement
D. Exfiltration - ANSWER-D. Exfiltration




A penetration tester has gained access to a Linux machine and would like to
collect information about machines with which the compromised machine is
currently communicating with. Which of the following commands will provide
this information?


A. nmap -sS <targetIP>
B. ss -t state established
C. ipconfig /all
D. hostname - ANSWER-B. ss -t state established




MSBuild accepts code in which format to execute inline tasks for bypassing
application control?


A. CSV
B. XML
C. JSON
D. TXT - ANSWER-B. XML


Which of the following is most commonly the primary access mechanism for
Linux systems?
$22.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
martinmwambingu54
4.0
(1)

Conoce al vendedor

Seller avatar
martinmwambingu54 Johns Hopkins University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
7
Miembro desde
5 meses
Número de seguidores
1
Documentos
854
Última venta
1 mes hace
A+ EXAM ARCHIVES YOUR BLUEPRINT FOR ACADEMIC SUCCESS!

Welcome to A+ EXAM ARCHIVES – Your New Frontier for Academic Success on Stuvia! We\'re pioneering a fresh approach to study resources. We\'re dedicated to bringing you meticulously engineered, verified study solutions designed to unlock your full potential and drive remarkable academic success. Our commitment is clear: to provide cutting-edge content that is not only exceptionally clear and accurate but also strategically optimized to streamline your learning process. Whether you\'re aiming to master complex concepts, prepare for upcoming challenges, or simply seeking intelligent, reliable study tools, our curated collection of next-gen notes, agile summaries, and comprehensive learning frameworks is built to give you a distinct advantage. We understand that today\'s students need more than just information – they need effective, innovative solutions. That\'s why every document we create is thoughtfully developed to meet your specific learning requirements, ensuring you have the powerful tools to navigate your academic journey with absolute confidence. Join us at the forefront of smarter studying. Explore our store today and be among the first to experience a new level of academic support. Activate your A+ potential now!

Lee mas Leer menos
4.0

1 reseñas

5
0
4
1
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes