Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?

A.

Biometric device

B.

Smart card

C.

Baseline audit

D.

Vulnerability scanner

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. (Choose two.)

A.

Teardrop attack

B.

Land attack

C.

Ping of Death attack

D.

SYN flood attack

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

A.

tcpdump -F file_name

B.

tcpdump -D file_name

C.

tcpdump -A file_name

D.

tcpdump -X file_name

Which of the following is the default port for POP3?

A.

80

B.

25

C.

21

D.

110

What is the function of baseline audit?

A.

Packet filtering

B.

Packet sniffing

C.

ARP spoofing

D.

Data capturing

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

A.

P0f

B.

Superscan

C.

Nmap

D.

NBTscan

A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network. The management wants to initiate a persistent connection with the managed devices until the block is removed.

Which of the following will you configure in the network to accomplish the task?

A.

Access Control List

B.

Firewall

C.

Network Admission Control

D.

Virtual LAN

Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?

A.

Kismet

B.

Hping2

C.

Nemesis

D.

Scapy

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

A.

Honeynet

B.

Production honeypot

C.

Research honeypot

D.

Honeyfarm

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.

Which of the following tools is John using to crack the wireless encryption keys?

A.

Kismet

B.

AirSnort

C.

PsPasswd

D.

Cain