Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

File-based

C.

Signature-based

D.

Anomaly-based

Which of the following is an attack with IP fragments that cannot be reassembled?

A.

Dictionary attack

B.

Smurf attack

C.

Teardrop attack

D.

Password guessing attack

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

Which of the following statements are true about an IDP rule base notification?

A.

It can be defined as reusable logical entities that the user can apply to the rules.

B.

When an action is performed, a notification defines how to log information.

C.

It is used to specify the type of network traffic that has to be monitored for attacks.

D.

It directs an IDP to drop or close the connection.

Which of the following wireless security features provides the best wireless security mechanism?

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WEP

D.

WPA

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

A.

Application protocol-based intrusion detection system (APIDS)

B.

Network intrusion detection system (NIDS)

C.

Protocol-based intrusion detection system (PIDS)

D.

Host-based intrusion detection system (HIDS)

Which of the following is the default port for POP3?

A.

25

B.

21

C.

80

D.

110

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

A.

It uses longer subnet masks than those used in IPv4.

B.

It increases the number of available IP addresses.

C.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

D.

It provides improved authentication and security.

E.

It uses 128-bit addresses.

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

A.

DNS cache poisoning

B.

ARP spoofing

C.

MAC spoofing

D.

NAT spoofing

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

A.

Web proxy server

B.

Open proxy server

C.

Forced proxy server

D.

Caching proxy server