Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

A.

NAT

B.

Firewall

C.

Port forwarding

D.

MAC filtering

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

A.

Man-in-the-middle

B.

Port scanning

C.

Session hijacking

D.

ARP spoofing

Sam works as a Security Manager for Gentech Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives. Which of the following rulebases will he use to accomplish the task?

A.

SYN Protector rulebase

B.

Network Honeypot rulebase

C.

Exempt rulebase

D.

Backdoor rulebase

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

A.

Fragmentation overwrite attack

B.

Insertion attack

C.

Fragmentation overlap attack

D.

Evasion attack

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cookies folder

B.

Temporary Internet Folder

C.

Download folder

D.

History folder

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

portsentry

B.

nmap

C.

libnids

D.

scanlogd

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cheops-ng

B.

Fport

C.

Elsave

D.

Cheops

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

A.

Windows Firewall blocks the command line tools.

B.

Core Networking Firewall rules do not allow IPv4 or IPv6.

C.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

D.

Windows Firewall rules do not allow Core Networking Tools.

Which of the following is a Windows-based tool used for packet analysis?

A.

WinPcap

B.

AirPcap

C.

Tcpdump

D.

WinDump

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

A.

Anamoly-based detection

B.

Signature-based detection

C.

Policy-based detection

D.

Honey pot detection