Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.
On the basis of above information, which of the following types of attack is Adam attempting to perform?
Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Which of the following features are supported by Secure Shell?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?
Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?
Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities.
Which of the following tools are examples of HIDS?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following statements are true about the Network Honeypot a rulebase?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following responsibilities does not come under the audit process?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following devices are used to implement Network Address Translation (NAT)?
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.
He has successfully completed the following steps of the preattack phase:
>> Information gathering
>> Determining network range
>> Identifying active machines
>> Finding open ports and applications
>> OS fingerprinting
>> Fingerprinting services
Now Jain wants to perform network mapping of the ABC network.
Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:
• Limit events that occur from security threats such as viruses, worms, and spyware.
• Restrict access to the network based on identity or security posture.
Which of the following services will you deploy in the network to accomplish the tasks?
Which of the following tools is described below?
It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.
Which of the following devices works as a transparent bridge between the wireless clients and the wired network?
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. (Choose two.)
You are tasked with configuring your routers with a minimum security standard that includes the following:
• A local Username and Password configured on the router
• A strong privilege mode password
• Encryption of user passwords
• Configuring telnet and ssh to authenticate against the router user database
Choose the configuration that meets these requirements best.
An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well.
Which of the following statements is true about IPv6?
Which of the following is a version of netcat with integrated transport encryption capabilities?
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?
Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?
Which of the following statements is true about ICMP packets?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.
Which of the following applications will you use to accomplish the task?
Which of the following ports cannot be used to access the router from a computer?
Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?
Each correct answer represents a complete solution. (Choose two.)
What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?
Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).
What attack will his program expose the Web application to?
Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?
The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.
On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. (Choose all that apply.)
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.
Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. (Choose two.)
You work as a Network Architect for ABC Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:
>> Provide security for the web traffic.
>> Browser clients can support the VPN connection to a host.
Which of the following will you configure to implement the given features in the network?
At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?