Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

A.

Twinge attack

B.

SYN attack

C.

Replay attack

D.

Land attack

Fill in the blank with the appropriate utility.

________ is a table-based system or structure that defines the rulesets needed to transform or filter network packets.

A.

Port Address Translation (PAT)

B.

Magic Lantern

C.

Static NAT

D.

iptables

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform tests on computer files and databases?

A.

Parallel Simulation

B.

Custom Audit Software (CAS)

C.

Generalized Audit Software (GAS)

D.

Test Data

Which of the following statements are true about the Network Honeypot a rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Its operation setting toggles between the network honeypot on and off.

B.

Its rules are triggered when a source IP address sends a connection request to the destination IP address and service specified in the rule.

C.

It does not support any IP action.

D.

It is used to detect reconnoitering activities.

In which of the following ways can you use the snort tool?

A.

Virus, Keylogger, and Packet logger

B.

Worm, Sniffer, and Password cracker

C.

Firewall, Sniffer, and Keylogger

D.

IDS, Packet logger, and Sniffer

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.

Which of the following tools works as a firewall for the Linux 2.4 kernel?

A.

OpenSSH

B.

IPChains

C.

Stunnel

D.

IPTables

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

A.

2

B.

0

C.

1

D.

F

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.

Which of the following applications will you use to accomplish the task?

A.

Network enumerator

B.

Port scanner

C.

Web application security scanner

D.

Computer worm

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message.

Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

A.

Confidentiality

B.

Data availability

C.

Authentication

D.

Non-repudiation

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone.

Which of the following commands will you use to accomplish the task?

A.

Dnscmd /config /enableglobalnames 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnamessupport 1

D.

Dnscmd /config /enableglobalnamessupport 0