John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?
Answer : D
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?
Answer : A
Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?
Answer : D
A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network.
The management wants to initiate a persistent connection with the managed devices until the block is removed. Which of the following will you configure in the network to accomplish the task?
Answer : C
cannot be used to access the router from a computer?
Answer : C
In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?
Each correct answer represents a complete solution. Choose all that apply.
Answer : A,D
Mark works as a Network Security Administrator for BlueWells Inc. The company has a
Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Answer : B,C,D
Which of the following protocols is used with a tunneling protocol to provide security?
Answer : D
You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks. Which of the following applications will you use to accomplish the task?
Answer : D
You are configuring a public access wireless connection. Which of the following is the best way to secure this connection?
Answer : B
Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?
Answer : A
Which of the following firewalls filters the traffic based on the header of the datagram?
Answer : B
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the pre-attack phase to check the security of the We-are-secure network: l Gathering information l Determining the network range l Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Answer : C
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.
A firewall has been configured on the network. You configure a filter on the router. You operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?
Answer : A