Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

A.

Sniffer

B.

tcptraceroute

C.

Fpipe

D.

tcptrace

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.

While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.

What is the cause of the issue?

A.

Core Networking Firewall rules do not allow IPv4 or IPv6.

B.

Windows Firewall blocks the command line tools.

C.

Windows Firewall rules do not allow Core Networking Tools.

D.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

A.

Port scanner

B.

Computer worm

C.

Network enumerator

D.

Web application security scanner

You work as a Network Administrator for ABC Inc.

The company's network contains five Windows 2003 servers and ninety Windows XP Professional client computers. You want to view all the incoming requests to an Internet Information Services (IIS) server and allow only requests that comply with a rule set, created by you, to be processed. You also want to detect the intrusion attempts by recognizing the strange characters in a URL on a Web server.

What will you do to accomplish the task?

A.

Configure a connection to the SQL database by using the RELOG command-line utility.

B.

Use the Remote Desktop Protocol (RDP).

C.

Use the HFNETCHK utility.

D.

Use the URL Scan tool.

You are configuring a public access wireless connection.

Which of the following is the best way to secure this connection?

A.

Not broadcasting SSID

B.

Implementing anti-virus

C.

Using MAC filtering

D.

Using WPA encryption