Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network.

After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

A.

False Positive

B.

True Negative

C.

False Negative

D.

True Positive

Which of the following wireless security features provides the best wireless security mechanism?

A.

WPA with Pre Shared Key

B.

WPA with 802.1X authentication

C.

WEP

D.

WPA

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A.

80

B.

21

C.

443

D.

22

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

A.

PING

B.

TELNET

C.

NETSTAT

D.

TRACERT

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist.

Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

A.

ImageMASSter Solo-3

B.

ImageMASSter 4002i

C.

FireWire DriveDock

D.

Wipe MASSter

Which of the following is the difference between SSL and S-HTTP?

A.

SSL operates at the network layer and S-HTTP operates at the application layer.

B.

SSL operates at the transport layer and S-HTTP operates at the application layer.

C.

SSL operates at the application layer and S-HTTP operates at the transport layer.

D.

SSL operates at the application layer and S-HTTP operates at the network layer.

With reference to the given case study, one of the security goals requires to configure a secure connection between the Boston distribution center and the headquarters. You want to implement IP filter to fulfill the security requirements. How should you implement IP filters at the headquarters?

(Click the Exhibit button on the toolbar to see the case study.)

A.

Add source filters for the headquarters for UDP port 80 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 80 and IP protocol 50.

B.

Add source filters for the Boston distribution center for UDP port 80 and IP protocol 50.

Add destination filters for headquarters for UDP port 80 and IP protocol 50.

C.

Add source filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

Add destination filters for the headquarters for UDP port 1701 and IP protocol 50.

D.

Add source filters for the headquarters for UDP port 1701 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

Which of the following file systems supports the hot fixing feature?

A.

FAT16

B.

exFAT

C.

NTFS

D.

FAT32

Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

A.

Network enumerating

B.

Packet collision

C.

Distributed Checksum Clearinghouse

D.

Packet crafting

You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?

A.

DMZ

B.

SPI firewall

C.

IDS

D.

Application Gateway firewall

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

A.

Tcpdump

B.

Ettercap

C.

Mendax

D.

Fragroute

Which of the following is the default port for File Transport Protocol (FTP)?

A.

21

B.

25

C.

23

D.

80

You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.

You have physically installed sensors at all key positions throughout the network such that they all report to the command console.

What will be the key functions of the sensors in such a physical layout?

Each correct answer represents a complete solution. Choose all that apply.

A.

To collect data from operating system logs

B.

To notify the console with an alert if any intrusion is detected

C.

To analyze for known signatures

D.

To collect data from Web servers

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized

Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.

Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

A.

Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

B.

Attacker can gain access to the Web server in a DMZ and exploit the database.

C.

Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

D.

Attacker can exploit any protocol used to go into the internal network or intranet of the com pany

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

A.

DNS

B.

HTTP/HTTPS

C.

DHCP

D.

NTP