Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following types of audit constructs a risk profile for existing and new projects?

A.

Innovative comparison audit

B.

Technological innovation process audit

C.

Technological position audit

D.

Client/Server, Telecommunications, Intranets, and Extranets audits

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.

He has successfully completed the following steps of the preattack phase:

>> Information gathering

>> Determining network range

>> Identifying active machines

>> Finding open ports and applications

>> OS fingerprinting

>> Fingerprinting services

Now Jain wants to perform network mapping of the ABC network.

Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Traceroute

B.

Cheops

C.

NeoTrace

D.

Ettercap

You work as a Network Administrator for ABC Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address.

Which of the following types of addresses will you choose?

A.

Local-link

B.

Site-local

C.

Global unicast

D.

Loopback

Which of the following ports cannot be used to access the router from a computer?

A.

Console port

B.

Vty

C.

Aux port

D.

Serial port

Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)

A.

Initiate rules of the rulebase

B.

Notify

C.

Drop/block session

D.

Close connection

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted.

What tool would you use to accomplish this?

A.

Password cracker

B.

Performance Monitor

C.

Packet sniffer

D.

Vulnerability analyzer

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A.

Dynamic NAT

B.

Static NAT

C.

Cache NAT

D.

Port Address Translation (PAT)

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred.

Which of the following switches will she use with CHKDSK command to accomplish the task?

A.

CHKDSK /R /F

B.

CHKDSK /I

C.

CHKDSK /V /X

D.

CHKDSK /C /L

Which of the following is an attack with IP fragments that cannot be reassembled?

A.

Password guessing attack

B.

Smurf attack

C.

Teardrop attack

D.

Dictionary attack

Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.

Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

A.

nc -v -n 208.100.2.25 80

B.

nmap -v -O www.abc.com

C.

nmap -v -O 208.100.2.25

D.

nc 208.100.2.25 23