Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

A.

PsList

B.

Cain

C.

Fpipe

D.

PsExec

Which of the following are the examples of technical controls?

Each correct answer represents a complete solution. Choose three.

A.

Auditing

B.

System access

C.

Data backups

D.

Network acchitecture

Which of the following is a link-state routing protocol?

A.

IGRP

B.

RIP v2

C.

RIP v1

D.

OSPF

Which of the following OSI model layers handles translation of data into standard format, data compression, and decompression?

A.

Application

B.

Physical

C.

Presentation

D.

Session

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers?

Each correct answer represents a complete solution. Choose all that apply.

A.

SocketShield

B.

Enum

C.

KFSensor

D.

Sheep dip

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

A.

Stateful

B.

Application level proxy

C.

Packet filtering

D.

Circuit level proxy

Which of the following uses a tunneling protocol?

A.

Firewall

B.

Internet

C.

LAN

D.

VPN

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses Password Authentication Protocol (PAP) for user authentication.

B.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

C.

It uses Internet Protocol (IP) for data integrity.

D.

It uses Authentication Header (AH) for data integrity.

Which of the following OSI model layers handles addressing and routing?

A.

Session

B.

Physical

C.

Network

D.

Application

Which of the following terms refers to a momentary low voltage?

A.

Blackout

B.

Spike

C.

Noise

D.

Sag

Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?

A.

Spike

B.

Brownout

C.

Electrical line noise

D.

Transient

Which of the following allows an attacker to enter malicious data into a Website?

A.

Cross site scripting

B.

Inline scripting

C.

Windows PowerShell scripting

D.

Client-side scripting

Which of the following statements about buffer overflow is true?

A.

It is a condition in which an application receives more data than it is configured to accept.

B.

It is a collection of files used by Microsoft for software updates released between major service pack releases.

C.

It is a false warning about a virus.

D.

It manages security credentials and public keys for message encryption.

Which of the following tools or services is used to find the entire IP address range used by an organization?

A.

TRACERT

B.

Ping Scanner

C.

PATHPING

D.

Share Scanner

Which of the following are the responsibilities of the custodian of data?

Each correct answer represents a complete solution. Choose two.

A.

Security of data

B.

User authentication

C.

Maintaining integrity of data

D.

Backing up data