Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.

What will you do when you are required to see all traffic of the network?

A.

Connect the sniffer device to a Switched Port Analyzer (SPAN) port.

B.

Connect the sniffer device to a Remote Switched Port Analyzer (RSPAN) port.

C.

Configure Network Access Control (NAC).

D.

Configure VLAN Access Control List (VACL).

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

A.

TCP

B.

UDP

C.

TELNET

D.

ICMP

You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed.

What type of response is the IDS giving?

A.

False Negative

B.

False Positive

C.

True Positive

D.

True Negative

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

A.

802.11a

B.

802.11b

C.

802.11

D.

802.11g

Which of the following types of vulnerability scanners performs a black-box test?

A.

Port scanner

B.

Web application security scanner

C.

CGI scanner

D.

Network scanner

An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well.

Which of the following statements is true about IPv6?

A.

It implements broadcasting.

B.

It eliminates the primary need for Network Address Translation (NAT).

C.

It uses symmetric key encryption.

D.

Its address is 32 bits in length.

Which of the following address translation types only translates one (and only one) IP address to another without using ports?

A.

Dynamic NAT

B.

NAT

C.

PAT

D.

Static NAT

You run the tcpdump command line utility and get a report produced by tcpdump.

What information does this report include?

Each correct answer represents a complete solution. (Choose three.)

A.

Packets captured

B.

Packets dropped by kernel

C.

Packets discarded

D.

Packets received by filter

Which of the following techniques is used to identify attacks originating from a botnet?

A.

Recipient filtering

B.

BPF-based filter

C.

IFilter

D.

Passive OS fingerprinting

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers.

Which of the following programs can Mark use to fulfill this requirement?

A.

Wingate

B.

Microsoft Internet Security & Acceleration Server (ISA)

C.

Sniffer

D.

SOCKS