Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. (Choose two.)
Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?
Which of the following is the default port for POP3?
What is the function of baseline audit?
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network. The management wants to initiate a persistent connection with the managed devices until the block is removed.
Which of the following will you configure in the network to accomplish the task?
Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?
Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.
Which of the following tools is John using to crack the wireless encryption keys?