Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?
Which of the following attacks can be mitigated by providing proper training to the employees in an organization?
Which of the following responsibilities does not come under the audit process?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following tools detects certain types of packet filters and NAT setups?
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.
While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.
What is the cause of the issue?
Which of the following can be used in an extended access list to filter traffic?
Each correct answer represents a part of the solution. (Choose all that apply.)
Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack.
What can he do to accomplish this?
In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?
Each correct answer represents a complete solution. (Choose all that apply.)
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7.
Which of the following will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message.
Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?
Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?
Which of the following is an attack with IP fragments that cannot be reassembled?
Which of the following commands is recommended by Cisco for latest switches and routers to erase the contents of NVRAM?
Which of the following group management messages is used by routers to handle the IPv6 multicast routing?
In which of the following conditions is the SYN Protector rule base activated in passive mode?
Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?
A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks.
Which of the following does the remote access VPN use for offering these types of connections?
Each correct answer represents a complete solution. (Choose two.)
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.
Which of the following measures will you take over the site network devices of the network?
Fill in the blank with the appropriate tool name.
______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.
Which of the following components are used in the implementation of a wireless intrusion prevention system?
Each correct answer represents a part of the solution. (Choose three.)
Which of the following address translation types only translates one (and only one) IP address to another without using ports?
You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks.
Which of the following protocols will you block to accomplish this task?
Jain works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.abc.com.
He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the ABC server.
To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus.
Which of the following IDS evasion attacks is John performing?
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure security mechanisms for the network of the company. You have decided to configure a packet filtering firewall.
Which of the following may be the reasons that made you choose a packet filtering firewall as a security mechanism?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network.
Which of the following tools will you use?
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. (Choose all that apply.)
In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool.
Which of the following tools is Adam using?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name.
What is the most likely cause?
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?
Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?