Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

A.

6to4

B.

PortProxy

C.

Teredo

D.

ISATAP

Which of the following is the function of the editcap utility of Wireshark?

A.

To analyze data packets.

B.

To remove duplicate packets.

C.

To transfer data packets.

D.

To check data packets.

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command.

Which of the following commands will you use?

A.

ping -l

B.

ping -t

C.

ping -a

D.

ping -n

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

A.

Web proxy server

B.

Forced proxy server

C.

Open proxy server

D.

Caching proxy server

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

IPTables

B.

IPFilter

C.

Zone Alarm

D.

BlackICE

Which of the following techniques correlates information found on multiple hard drives?

A.

Live analysis

B.

Gap analysis

C.

Data analysis

D.

Cross-drive analysis

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server's own loopback address, but it fails to ping. You restart the server, but the problem persists.

What is the most likely cause?

A.

The server's NIC is not working.

B.

Automatic IP addressing is not working.

C.

The server is configured with unspecified IP address.

D.

The cable that connects the server to the switch is broken.

E.

The switch device is not working.

Which of the following describes the term inside global in NAT configuration?

A.

It is a local MAC address assigned to a host in a private network.

B.

It is the data that comes inside a local network from an external host.

C.

It is a local IP address assigned to a host in a private network.

D.

It is the registered (public) IP address that represents the inside hosts in private network to the outside network.

Which of the following responsibilities does not come under the audit process?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Reviewing the results of the audit procedures.

B.

Reporting all facts and circumstances of the irregular and illegal acts.

C.

Planning the IT audit engagement based on the assessed level of risk.

D.

Applying security policies.

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering