Which of the following types of audit constructs a risk profile for existing and new projects?
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.
He has successfully completed the following steps of the preattack phase:
>> Information gathering
>> Determining network range
>> Identifying active machines
>> Finding open ports and applications
>> OS fingerprinting
>> Fingerprinting services
Now Jain wants to perform network mapping of the ABC network.
Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for ABC Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address.
Which of the following types of addresses will you choose?
Which of the following ports cannot be used to access the router from a computer?
Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)
You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted.
What tool would you use to accomplish this?
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred.
Which of the following switches will she use with CHKDSK command to accomplish the task?
Which of the following is an attack with IP fragments that cannot be reassembled?
Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.
Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose two.)