Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?
A. D
B. N
C. Z
D. C
Which of the following wireless security features provides the best wireless security mechanism?
A. WPA with Pre Shared Key
B. WPA with 802.1X authentication
C. WEP
D. WPA
Which of the following organizations is dedicated to computer security research and information sharing?
A. FBI
B. NIPC
C. Honeynet Project
D. IEEE
Which of the following tools is described below?
It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses
the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.
A. Dsniff
B. Libnids
C. Cain
D. LIDS
For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be
whether the user can access Web sites after powering the computer and logging on.
Each correct answer represents a complete solution. Choose all that apply.
A. DNS
B. HTTP/HTTPS
C. DHCP
D. NTP
Which of the following statements about User Datagram Protocol (UDP) is true?
A. It is a hardware protocol.
B. It is a connectionless protocol.
C. It is a tunneling protocol.
D. It is a connection-oriented protocol.
Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?
A. Adler-32
B. Hash filtrer
C. Hash buster
D. Checksum
You are using the TRACERT utility to trace the route to passguide.com. You receive the following output:
Which of the following conclusions can you draw from viewing the output? Each correct answer represents a complete solution. Choose two.
A. Everything is fine.
B. One of the routers on the path to the destination is not functional.
C. The destination computer is not operational.
D. The IP address of the destination computer is not resolved.
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker? Each correct answer represents a complete solution. Choose all that apply.
A. portsentry
B. libnids
C. nmap
D. scanlogd
Which of the following determines which protocols can be used by clients to access the Internet in an ISA Server enabled network?
A. SMTP filter
B. POP intrusion detection filter
C. Site and content rule
D. Protocol rule
Which of the following tools is used to recover data and partitions, and can run on Windows, Linux, SunOS, and Macintosh OS X operating systems?
A. GetDataBack
B. Acronis Recovery Expert
C. Active@ Disk Image
D. TestDisk
Which of the following is an example of a social engineering attack?
A. Phishing
B. Man-in-the-middle attack
C. Browser Sniffing
D. E-mail bombing
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
A. Stoner
B. Code Red
C. Brain
D. Sircam
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.
B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.
C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.
D. The Enable Intrusion detection check box on the General tab page of the IP Packet FiltersProperties dialog box is not selected.
Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?
A. D
B. N
C. Z
D. C