Which of the following tools is used to detect spam email without checking the content?
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.
While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.
What is the cause of the issue?
Paul works as a Technical Representative in a CSIRT for ABC Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Paul wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis.
Which of the following is the correct order for searching data on a Windows based system?
You work as a Network Administrator for ABC Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing.
Which of the following types of addresses are supported by IPv6?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for ABC Inc.
The company's network contains five Windows 2003 servers and ninety Windows XP Professional client computers. You want to view all the incoming requests to an Internet Information Services (IIS) server and allow only requests that comply with a rule set, created by you, to be processed. You also want to detect the intrusion attempts by recognizing the strange characters in a URL on a Web server.
What will you do to accomplish the task?
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following is used as a default port by the TELNET utility?
A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.
Which technology is used to allow a pool of users to share one global IP address for Internet access?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the preattack phase successfully:
• Information gathering
• Determination of network range
• Identification of active systems
• Location of open ports and applications
Now, which of the following tasks should he perform next?
Which of the following program loads IOS image into RAM?
Which of the following can provide security against man-in-the-middle attack?
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool.
Which of the following tools is Adam using?
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.
Which of the following tools works as a firewall for the Linux 2.4 kernel?
Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data.
Which of the following tools can he use to accomplish the task?
The stateful firewalls combine the significant flows into conversations.
Which of the following properties is used to classify a flow?
Each correct answer represents a part of the solution. (Choose all that apply.)
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration.
Which of the following ports will you have to open on the router to resolve the issue?
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. (Choose two.)
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo.
Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network.
What feature of a router would accomplish this?
Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events.
NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?
John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7.
Which of the following will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
You are configuring a public access wireless connection.
Which of the following is the best way to secure this connection?
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?
The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.
On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?
Each correct answer represents a complete solution. (Choose all that apply.)
You are tasked with configuring your routers with a minimum security standard that includes the following:
• A local Username and Password configured on the router
• A strong privilege mode password
• Encryption of user passwords
• Configuring telnet and ssh to authenticate against the router user database
Choose the configuration that meets these requirements best.
Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?
Which of the following techniques correlates information found on multiple hard drives?
You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network.
Which of the following will be useful for accessing the server from outside the network?
You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed.
What type of response is the IDS giving?
Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?
Each correct answer represents a part of the solution. (Choose three.)
Which of the following protocols is used with a tunneling protocol to provide security?
Which of the following devices are used to implement Network Address Translation (NAT)?
Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?
In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?