Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.
What will you do when you are required to see all traffic of the network?
Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.
Which of the following protocols does the DCC use?
You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed.
What type of response is the IDS giving?
Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?
Which of the following types of vulnerability scanners performs a black-box test?
An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well.
Which of the following statements is true about IPv6?
Which of the following address translation types only translates one (and only one) IP address to another without using ports?
You run the tcpdump command line utility and get a report produced by tcpdump.
What information does this report include?
Each correct answer represents a complete solution. (Choose three.)
Which of the following techniques is used to identify attacks originating from a botnet?
Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers.
Which of the following programs can Mark use to fulfill this requirement?