John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?
Which of the following are the examples of technical controls?
Each correct answer represents a complete solution. Choose three.
Which of the following is a link-state routing protocol?
Which of the following OSI model layers handles translation of data into standard format, data compression, and decompression?
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of firewalls looks deep into packets and makes granular access control decisions?
Which of the following uses a tunneling protocol?
Which of the following statements about IPSec are true?
Each correct answer represents a complete solution. Choose two.
Which of the following OSI model layers handles addressing and routing?
Which of the following terms refers to a momentary low voltage?
Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?
Which of the following allows an attacker to enter malicious data into a Website?
Which of the following statements about buffer overflow is true?
Which of the following tools or services is used to find the entire IP address range used by an organization?
Which of the following are the responsibilities of the custodian of data?
Each correct answer represents a complete solution. Choose two.