Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following protocols is used with a tunneling protocol to provide security?

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack.

Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Event logs

B.

System logs

C.

Web server logs

D.

Program logs

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

A.

MAC duplicating

B.

IP spoofing

C.

ARP spoofing

D.

MAC flooding

Which of the following steps is involved in the network planning process?

A.

Documentation and analysis of results

B.

Data acquisition

C.

Analysis/Forecasting

D.

Network-synthesis

Which of the following fields are specified when rules are created for the Network Honeypot rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

A destination/service match condition

B.

Detection settings

C.

Response options

D.

Operation mode

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

A.

Sam Spade

B.

ACL

C.

Cookies

D.

NIDS

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

A.

Insertion

B.

Fragmentation overlap

C.

Fragmentation overwrite

D.

Session splicing

You work as a Security Administrator for ABC Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.

What are these vulnerabilities?

Each correct answer represents a complete solution. (Choose three.)

A.

Input/Output validation

B.

Denials of service against the TCP/IP stack

C.

Server configuration mistakes/errors/version

D.

Specific application problems

Which of the following TShark options is used to set capture buffer size in MB?

A.

-F

B.

-B

C.

-G

D.

-C

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Blocking IP address.

B.

Using the network-ingress filtering.

C.

Using LM hashes for passwords.

D.

Using Intrusion detection systems.

E.

Limiting the amount of network bandwidth.