Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following techniques can be used to determine the network ranges of any network?

A.

Whois query

B.

SQL injection

C.

Snooping

D.

Web ripping

The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path. In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?

A.

Load

B.

MTU

C.

Hop count

D.

Bandwidth

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

A.

Determining network range

B.

Identifying active machines

C.

Enumeration

D.

Finding open ports and applications

E.

Information gathering

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

A.

Snort

B.

IDS

C.

Firewall

D.

WIPS

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)

A.

Using WPA encryption

B.

MAC filtering the router

C.

Not broadcasting SSID

D.

Using WEP encryption

Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?

A.

149 and 133

B.

203 and 333

C.

139 and 445

D.

198 and 173

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

A.

Antivirus log

B.

IDS log

C.

System log

D.

Firewall log

Which of the following is Microsoft's implementation of the file and application server for the Internet and private intranets?

A.

Internet Server Service (ISS)

B.

Internet Server (IS)

C.

WWW Server (WWWS)

D.

Internet Information Server (IIS)

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

A.

Misconfigured router

B.

DoS attack

C.

Syn flood

D.

Virus

In addition to denying and granting access, what other services does a firewall support?

A.

Network Access Translation (NAT)

B.

Secondary connections

C.

Control Internet access based on keyword restriction

D.

Data caching