Exam 4: VPN Penetration Testing
Exam 1: Wireless Network Penetration Testing10 Questions
Exam 2: Advanced Wireless Testing10 Questions
Exam 3: VoIP Penetration Testing10 Questions
Exam 4: VPN Penetration Testing10 Questions
Exam 5: Wardialing10 Questions
Exam 6: Bluetooth and Handheld Device Penetration Testing10 Questions
Exam 7: Telecommunication and Broadband Communication Penetration Testing10 Questions
Exam 8: Communication Media14 Questions
Select questions type
____ analyzes and cracks preshared keys that use RFC-compliant aggressive mode authentication.
Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
D
____ supports preshared key cracking in IKE aggressive mode using preshared key authentication.
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
A
Testers can use IKE-Scan with the ____ option to obtain IKE aggressive mode preshared keys through brute force or dictionary attacks.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
B
SSL-based VPNs use standard Web-based protocols on TCP port ____.
(Multiple Choice)
4.9/5
(28)
PPTP uses TCP port ____to establish a connection with a remote VPN server.
(Multiple Choice)
4.9/5
(34)
____ is a command-line tool that uses the IKE protocol to discover, fingerprint, and test IPSec VPN servers.
(Multiple Choice)
4.9/5
(40)
____ can be used to determine the vulnerabilities in the preshared key implementation of VPN servers.
(Multiple Choice)
4.9/5
(32)
____ allows secure connections to any other PGPnet/IPSec host on the Internet regardless of whether the user has communicated with that host previously, without preconfiguration of that host.
(Multiple Choice)
4.8/5
(33)
____ can monitor the VPN (PPTP and IPSec) and SSL (HTTPS) connectivity of both wired and wireless networks.
(Multiple Choice)
4.8/5
(47)
The ____ option of IKE-Scan records the response time of all packets, and it delays for 60 seconds after the last packet is received.
(Multiple Choice)
4.8/5
(36)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)