Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?
Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?A . NetfilterB . iptablesC . WinPcapD . tcpdumpView AnswerAnswer: D
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?A . Dynamic packet-filtering firewallB . Application layer firewallC . Proxy firewallD . Circuit-level firewallView AnswerAnswer: A
Which of the following can be the reasons for your problems?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall. Which of the...
Now, which of the following tasks should he perform next?
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully: • Information gathering • Determination of network range • Identification of active systems • Location of...
Which of the following are packet filtering tools for the Linux operating system? Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following are packet filtering tools for the Linux operating system? Each correct answer represents a complete solution. (Choose all that apply.)A . IPTablesB . IPFilterC . Zone AlarmD . BlackICEView AnswerAnswer: A,B
What will you do?
You work as a Network Administrator for ABC Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?A . Implement a WIPC . Implement a dynamic NAE ....
Which of the following protocols is used by voice over IP (VoIP) applications?
Which of the following protocols is used by voice over IP (VoIP) applications?A . IPv6B . TCPC . ICMPD . UDPView AnswerAnswer: D
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)A . Placing static ARP entries on servers and routesB . Using Private VLANsC . Using 8 digit passwords for authenticationD . Looking for...
Which of the following protocols is used by TFTP as a file transfer protocol?
Which of the following protocols is used by TFTP as a file transfer protocol?A . SMTPB . UDPC . TCPD . SNMPView AnswerAnswer: B
Which of the following types of addresses are supported by IPv6?
You work as a Network Administrator for ABC Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6? Each correct answer represents a complete solution. (Choose all that apply.)A...