Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?A . SnifferB . tcptracerouteC . FpipeD . tcptraceView AnswerAnswer: D
Which of the following commands will you use?
You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you...
Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state? Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state? Each correct answer represents a complete solution. (Choose all that apply.)A . Offset fieldB . MF flagC . Length of the dataD . IP identification numberE . IP...
Which of the following steps will you take to accomplish the task?
You work as a Network Administrator for ABC Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following...
Which of the following wireless security features provides the best wireless security mechanism?
Which of the following wireless security features provides the best wireless security mechanism?A . WPA with Pre Shared KeyB . WPAC . WPA with 802.1X authenticationD . WEPView AnswerAnswer: C
Which of the following tools can be used as a countermeasure to such an attack?
An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this...
What are the advantages of stateless autoconfiguration in IPv6?
What are the advantages of stateless autoconfiguration in IPv6? Each correct answer represents a part of the solution. (Choose three.)A . Ease of use.B . It provides basic authentication to determine which systems can receive configuration data.C . No host configuration is necessary.D . No server is needed for stateless...
What traffic does Snort support?
You work as a Network Administrator for ABC Inc. You want to configure Snort as an IDS for your company's wireless network, but you are concerned that Snort does not support all types of traffic. What traffic does Snort support? Each correct answer represents a complete solution. (Choose all that...
Which of the following tools can you use to accomplish the task?
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to...
Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access? Each correct answer represents a complete solution. (Choose two.)
Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access? Each correct answer represents a complete solution. (Choose two.)A . TcpdumpB . EttercapC . FragrouteD . MendaxView AnswerAnswer: C,D