Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network.

Which of the following utilities will you use?

A.

PING

B.

TELNET

C.

TRACERT

D.

IPCONFIG

Which of the following is an asymmetric encryption algorithm?

A.

Blowfish

B.

RC5

C.

Diffie-Hellman

D.

RC4

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

A.

Fraggle attack

B.

SYN Flood attack

C.

Land attack

D.

Ping of death attack

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

A.

tcpdump -A file_name

B.

tcpdump -D file_name

C.

tcpdump -X file_name

D.

tcpdump -F file_name

Which of the following is the default port for TACACS?

A.

UDP port 49

B.

TCP port 80

C.

TCP port 25

D.

TCP port 443

Which of the following utilities provides information as per the format given below?

A.

TRACERT

B.

NBTSTAT

C.

NETSTAT

D.

PING

Which of the following statements about Secure Shell (SSH) are true?

Each correct answer represents a complete solution. Choose three.

A.

It is the core routing protocol of the Internet.

B.

It allows data to be exchanged using a secure channel between two networked devices.

C.

It was designed as a replacement for TELNET and other insecure shells.

D.

It is a network protocol used primarily on Linux and Unix based systems.

Which of the following statements about the traceroute utility are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

B.

It records the time taken for a round trip for each packet at each router.

C.

It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

D.

It is an online tool that performs polymorphic shell code attacks.

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?

A.

Zombie

B.

External threat

C.

Internal threat

D.

Malware

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

A.

Close existing email account and open new email account.

B.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Send an email to the domain administrator responsible for the initiating IP address.

Which of the following is a reason to implement security logging on a DNS server?

A.

For recording the number of queries resolved

B.

For preventing malware attacks on a DNS server

C.

For measuring a DNS server's performance

D.

For monitoring unauthorized zone transfer

John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windowsbased network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task?

A.

tracert and pathping

B.

nslookup

C.

nbtstat

D.

netstat

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network.

You are configuring an Internet connection for your company. Your Internet service provider (ISP) has a UNIX-based server. Which of the following utilities will enable you to access the UNIX server, using a text-based connection?

A.

TELNET

B.

IPCONFIG

C.

PING

D.

FTP

E.

TRACERT

Which of the following protocols is used by voice over IP (VoIP) applications?

A.

UDP

B.

TCP

C.

ICMP

D.

IPv6

Which of the following terms describes an attempt to transfer DNS zone data?

A.

Reconnaissance

B.

Encapsulation

C.

Dumpster diving

D.

Spam