Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.
While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.
What is the cause of the issue?
Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?
You work as a Network Administrator for ABC Inc.
The company's network contains five Windows 2003 servers and ninety Windows XP Professional client computers. You want to view all the incoming requests to an Internet Information Services (IIS) server and allow only requests that comply with a rule set, created by you, to be processed. You also want to detect the intrusion attempts by recognizing the strange characters in a URL on a Web server.
What will you do to accomplish the task?
You are configuring a public access wireless connection.
Which of the following is the best way to secure this connection?