Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

John works as a Network Administrator for Samtech Inc. He has configured CDP on each interface of the router. Which of the following commands should he use to list the number of CDP advertisements?

A.

show interfaces [type number]

B.

show cdp traffic

C.

show interfaces status

D.

show cdp

Which of the following is the ability of a hacker to determine the nature of the network?

A.

Investigating

B.

Profiling

C.

Sniffing

D.

Intruding

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

TIS authentication

B.

Rhosts (rsh-style) authentication

C.

Kerberos authentication

D.

Password-based authentication

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

portsentry

B.

libnids

C.

nmap

D.

scanlogd

Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?

A.

Nmap

B.

Internet bot

C.

Dsniff

D.

Nikto

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

A.

Neighbor Solicitation

B.

Router Solicitation

C.

Neighbor Advertisement

D.

Router Advertisement

Which of the following monitors program activities and modifies malicious activities on a system?

A.

Back door

B.

RADIUS

C.

HIDS

D.

NIDS

You work as a Security Professional for PassGuide Inc. The company has a Linux-based network. You want to analyze the network traffic with Snort. You run the following command:

snort -v -i eth 0

Which of the following information will you get using the above command?

Each correct answer represents a complete solution. Choose all that apply.

A.

Protocol statistics

B.

Date stamp on the packets

C.

Number of packets received and dropped

D.

Application layer data

Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

A.

IPTraf

B.

MRTG

C.

Chkrootkit

D.

Ntop

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

D.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

A.

Sequence++ attack

B.

Cross Site Scripting attack

C.

Format string attack

D.

SQL injection attack

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

A.

Core Networking Firewall rules do not allow IPv4 or IPv6.

B.

Windows Firewall rules do not allow Core Networking Tools.

C.

Windows Firewall blocks the command line tools.

D.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

A.

Logical Link control and Media Access control

B.

Logical control and Link control

C.

Machine Link control and Logical Link control

D.

Data control and Media Access control

Which of the following software is used for Steganography?

A.

CryptoForge

B.

Fort Knox

C.

Dsniff

D.

Ethreal

At which port does a DHCPv6 client listen for DHCP messages?

A.

TCP port 546

B.

TCP port 547

C.

UDP port 546

D.

UDP port 547