Which one of the following cannot handle routing protocols properly?
Firewall is an IP packet filter that enforces the filtering and security policies to the flowing network traffic. Using firewalls in IPv6 is still the best way of protection from low level attacks at the network and transport layers. Which one of the following cannot handle routing protocols properly?A ....
Paulette presents the following screenshot to her boss so he can inform the clients about necessary changes need to be made. From the screenshot, what changes should the client company make?
Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to...
What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?
What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?A . Connect Scanning TechniquesB . SYN Scanning TechniquesC . Stealth Scanning TechniquesD . Port Scanning TechniquesView AnswerAnswer: C
Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?
Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?A . SYN ScanB . Connect() scanC . XMAS ScanD . Null ScanView AnswerAnswer: A
Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.
Identify the type of testing that is carried out without giving any information to the employees or administrative head of the organization.A . Unannounced TestingB . Double Blind TestingC . Announced TestingD . Blind TestingView AnswerAnswer: B
A framework is a fundamental structure used to support and resolve complex issues.
A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop applications which are more secure in using Internet and Intranet is:A . Microsoft Internet Security FrameworkB . Information System Security Assessment Framework (ISSAF)C ....
What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)?
What is a difference between host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS)? A . NIDS are usually a more expensive solution to implement compared to HIDC . Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor and stop such...
Which one of the following ports is used by NTP as its transport layer?
NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network. Which one of the following ports is used by NTP as its transport layer?A . TCP port 152B . UDP port 177C . UDP port 123D . TCP...
What IDS feature must George implement to meet this requirement?
George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The...
Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?
The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems. Which of the following information gathering terminologies refers to...