Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is used to detect the bad sectors in a hard disk under Linux environment?

A.

Badblocks

B.

CheckDisk

C.

ScanDisk

D.

CHKDSK

Adam works as a Network Administrator for passguide Inc. He wants to prevent the network from

DOS attacks. Which of the following is most useful against DOS attacks?

A.

Internet bot

B.

Honey Pot

C.

SPI

D.

Distributive firewall

Fill in the blank with the appropriate term.

___________ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. Your manager requires you migrate the network to IPv6-enabled network without affecting any client computers. Which of the following actions will you take to accomplish the task?

A.

Configure stub zone on the DNS servers in the network.

B.

Configure GlobalNames zones on the DNS servers in the network.

C.

Install a new Windows Server 2003 DNS server computer on each domain and configure GlobalNames zones.

D.

Configure the client computers to use WINS.

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

A.

Active IDS

B.

Signature-based IDS

C.

Passive IDS

D.

Network-based IDS

Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

A.

Adler-32

B.

Hash filtrer

C.

Hash buster

D.

Checksum

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails.

Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

A.

/log/var/mailog

B.

/var/log/logmail

C.

/var/log/mailog

D.

/log/var/logd

Which of the following is a valid IPv6 address?

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

A.

Unicast

B.

Multicast

C.

Broadcast

D.

Anycast

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

A.

By launching Sequence++ attack

B.

Route table poisoning

C.

By launching Social Engineering attack

D.

By launching Max Age attack

Who are the primary victims of smurf attacks on the contemporary Internet system?

A.

FTP servers are the primary victim to smurf attacks

B.

IRC servers are the primary victim to smurf attacks

C.

SMTP servers are the primary victim to smurf attacks

D.

Mail servers are the primary victim to smurf attacks

Which of the following utilities can generate a local static route table?

Each correct answer represents a complete solution. Choose two.

A.

ROUTE

B.

PING

C.

NETSTAT

D.

TRACERT

E.

NBTSTAT

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

A.

Hunt

B.

Alchemy Remote Executor

C.

Mendax

D.

Ettercap

What are the advantages of an application layer firewall?

Each correct answer represents a complete solution. Choose all that apply.

A.

It provides detailed logging information for management purposes.

B.

It prevents most of the spoofing and DoS attacks.

C.

It monitors and filters data.

D.

It provides authentication to a device.

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?

A.

EnCase image file

B.

PFR image file

C.

RAW image file

D.

iso image file