Which of the following tools scans the network systems for well-known and often exploited vulnerabilities?
A. Nessus
B. SAINT
C. SATAN
D. HPing
Which of the following types of transmission is the process of sending one bit at a time over a single transmission line?
A. Unicast transmission
B. Serial data transmission
C. Multicast transmission
D. Parallel data transmission
Which of the following is a firewall that keeps track of the state of network connections traveling across it?
A. Stateful firewall
B. Stateless packet filter firewall
C. Circuit-level proxy firewall
D. Application gateway firewall
Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.
A. Email spoofing
B. Junk mail
C. E-mail spam
D. Email jamming
James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?
A. ARP Sweep
B. ARP misconfiguration
C. ARP spoofinq
D. ARP Poisioning
Which of the following filters car be applied to detect an ICMP ping sweep attempt using Wireshark?
A. icmp.type==8
B. icmp.type==13
C. icmp.type==17
D. icmp.type==15
Which of the following is an example of MAC model?
A. Chinese Waterfall model
B. Clark-Beason integrity model
C. Access control matrix model
D. Bell-LaPadula model
Fill in the blank with the appropriate term. is a method for monitoring the e-mail delivery to the intended recipient.