Which of the following techniques can be used to determine the network ranges of any network?
The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path. In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?
Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? (Choose two)
Which TCP and UDP ports can be used to start a NULL session attack in NT and 2000 operating systems?
You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?
Which of the following is Microsoft's implementation of the file and application server for the Internet and private intranets?
You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?
In addition to denying and granting access, what other services does a firewall support?