You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?A . NmapB . Cain & AbelC . NessusD . SnortView AnswerAnswer: D
Why should the security analyst disable/remove unnecessary ISAPI filters?
Why should the security analyst disable/remove unnecessary ISAPI filters?A . To defend against social engineering attacksB . To defend against webserver attacksC . To defend against jailbreakingD . To defend against wireless attacksView AnswerAnswer: B
Which of the following solution will you suggest?
You are monitoring the network of your organizations. You notice that: There are huge outbound connections from your Internal Network to External IPs. On further investigation, you see that the External IPs are blacklisted. Some connections are accepted, and some are dropped. You find that it is a CnC communication....
Which of the following cannot be performed by the passive network sniffing?
When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?A . Identifying operating systems, services,...
From the following table, identify the wrong answer in terms of Range (ft).
From the following table, identify the wrong answer in terms of Range (ft). A . 802.11bB . 802.11gC . 802.16(WiMax)D . 802.11aView AnswerAnswer: D
Which of the following steps for risk assessment methodology refers to vulnerability identification?
Which of the following steps for risk assessment methodology refers to vulnerability identification?A . Determines if any flaws exist in systems, policies, or proceduresB . Assigns values to risk probabilities; Impact values.C . Determines risk probability that vulnerability will be exploited (High. Medium, Low)D . Identifies sources of harm to...
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?A . SHA-2B . SHA-3C . SHA-1D . SHA-0View AnswerAnswer: C
Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?A . nmap CA - PnB . nmap CsP Cp-65535-T5C . nmap CsT CO...
In Wireshark, the packet bytes panes show the data of the current packet in which format?
In Wireshark, the packet bytes panes show the data of the current packet in which format?A . DecimalB . ASCII onlyC . BinaryD . HexadecimalView AnswerAnswer: D
The developers are now asking you which network should the Presentation Tier (front- end web server) be placed in?
Developers at your company are creating a web application which will be available for use by anyone on the Internet, The developers have taken the approach of implementing a Three-Tier Architecture for the web application. The developers are now asking you which network should the Presentation Tier (front- end web...