Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.
A. Routers are responsible for making decisions about which of several paths network (orInternet)traffic will follow.
B. Routers do not limit physical broadcast traffic.
C. Routers organize addresses into classes, which are used to determine how to move packets fromone network to another.
D. Routers act as protocol translators and bind dissimilar networks.
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.
A. Using WEP encryption
B. Using WPA encryption
C. Not broadcasting SSID
D. MAC filtering the router
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Copyright
C. Utility model
D. Patent
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.
A. rwho -a
B. lastb
C. last
D. pwd
Which of the following softwares is used to perform constant monitoring of the network infrastructure?
A. Logdog
B. THCHydra
C. IPSentry
D. Cain
In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?
A. Firewalking
B. Snooping
C. Port redirection
D. UDP port scanning
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
A. Jason did not perform a vulnerability assessment.
B. Jason did not perform port scanning.
C. Jason did not perform covering tracks.
D. Jason did not perform foot printing.
E. Jason did not perform OS fingerprinting.
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
A. Stunnel
B. IPChains
C. IPTables
D. OpenSSH
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
· Network diagrams of the we-are-secure infrastructure · Source code of the security tools · IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
A. Graybox
B. Blackbox
C. Alpha testing
D. Whitebox
Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.
A. Anti-x
B. Image hide
C. Stegbreak
D. Snow.exe
By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.
A. By launching Social Engineering attack
B. By launching Sequence++ attack
C. Route table poisoning
D. By launching Max Age attack
Maria works as a Security Administrator for NetPerfect Inc. The company has a Windows-based network. Maria wants to ensure that the Sales executives of the company are able to surf the Internet only through a secure URL. Which of the following protocols provides a secure connection to the Internet?
A. FTP
B. HTTPS
C. HTTP
D. WAP
Which of the following parameters are required to be followed on receiving a suspicious mail according to the Department of Justice?
Each correct answer represents a part of the solution. Choose all that apply.
A. Call
B. Look
C. Identify
D. Stop
Burp Suite is a Java application for attacking web applications. This tool includes a proxy server, a spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?
A. Repeater
B. Spider
C. Intruder
D. Proxy Server
You work as a computer operator for BlueWells Inc. The company has a Windows-based network.
You find out that someone has manipulated your email account, as some of your mails have been deleted. You suspect that your password has been hacked by someone. You inform about this to Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that contains lots of text including username and password. Mark tells you that someone has installed software on your system that is recording all the keyboard strokes in a predefined log file. Which of the following software is Mark discussing about?
A. Spyware
B. Keylogger
C. Anti-Virus
D. Adware