Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following methods is a behavior-based IDS detection method?

A.

Protocol detection

B.

Knowledge-based detection

C.

Pattern matching detection

D.

Statistical anomaly detection

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network.

Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

FINALeMAIL

B.

R-mail

C.

EventCombMT

D.

eMailTrackerPro

Which of the following types of vulnerability scanners performs a black-box test?

A.

Port scanner

B.

CGI scanner

C.

Network scanner

D.

Web application security scanner

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

A.

Neighbor Advertisement

B.

Neighbor Solicitation

C.

Router Solicitation

D.

Router Advertisement

Which of the following features does the Nmap utility have?

Each correct answer represents a complete solution. Choose all that apply.

A.

It has a stealth approach to scanning and sweeping.

B.

It identifies services running on systems in a specified range of IP addresses using scanning and sweeping feature.

C.

It uses operating system fingerprinting technology to identify the operating system running on a target system.

D.

It is a location where an organization can easily view the event of a disaster, such as fire, flood, terrorist threat, or other disruptive events.

A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.

Which technology is used to allow a pool of users to share one global IP address for Internet access?

A.

Port Address Translation

B.

Pool Address Translation

C.

Private Address Translation

D.

Per-user Address Translation

Which of the following is a version of netcat with integrated transport encryption capabilities?

A.

Encat

B.

Nikto

C.

Cryptcat

D.

Socat

Which of the following are open-source vulnerability scanners?

A.

Nikto

B.

Hackbot

C.

NetRecon

D.

Nessus

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Sam works as a Security Manager for GenTech Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker. Which of the following rulebases will he use to accomplish the task?

A.

Backdoor rulebase

B.

Exempt rulebase

C.

Network Honeypot rulebase

D.

SYN Protector rulebase