Which tool would be used to collect wireless packet data?
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
Which command line switch would be used in NMAP to perform operating system detection?
Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?
What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?
Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?
Which of the following items is unique to the N-tier architecture method of designing software applications?
In the OSI model, where does PPTP encryption take place?