Which of the following protocols is used by TFTP as a file transfer protocol?
A. SMTP
B. UDP
C. TCP
D. SNMP
Which of the following is a version of netcat with integrated transport encryption capabilities?
A. Encat
B. Nikto
C. Socat
D. Cryptcat
Which of the following well-known ports is used by BOOTP?
A. UDP 67
B. TCP 21
C. UDP 69
D. TCP 161
Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?
A. no service password-encryption
B. service password-encryption
C. enable password-encryption
D. no enable password-encryption
Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers.
Which of the following programs can Mark use to fulfill this requirement?
A. Wingate
B. Microsoft Internet Security and Acceleration Server (ISA)
C. Sniffer
D. SOCKS
Passive OS fingerprinting (POSFP) is configured in an organization's network in order to improve the alert
output by reporting some information.
Which of the following information does it include?
Each correct answer represents a part of the solution. (Choose all that apply.)
A. Network security device
B. Source of the OS identification
C. Victim OS
D. Relevancy to the victim in the alert
Which of the following libraries does TShark use to capture traffic from the first available network interface?
A. bcap
B. dcap
C. scap
D. pcap
Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel
between two networked devices.
Which of the following features are supported by Secure Shell?
Each correct answer represents a complete solution. (Choose all that apply.)
A. SSH uses the client-server model.
B. SSH can transfer files using the associated HTTP or FTP protocols.
C. SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.
D. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process.
Which of the following actions will you take for this?
A. Install a host-based IDS
B. Enable verbose logging on the firewall
C. Install a DMZ firewall
D. Install a network-based IDS
Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?
A. IPS
B. NIDS
C. HIDS
D. DMZ
Which of the following is an attack with IP fragments that cannot be reassembled?
A. Password guessing attack
B. Smurf attack
C. Teardrop attack
D. Dictionary attack
You are configuring a public access wireless connection.
Which of the following is the best way to secure this connection?
A. Not broadcasting SSID
B. Implementing anti-virus
C. Using MAC filtering
D. Using WPA encryption
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration.
Which of the following ports will you have to open on the router to resolve the issue?
A. 20
B. 21
C. 80
D. 25
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
A. Dynamic NAT
B. Static NAT
C. Cache NAT
D. Port Address Translation (PAT)
As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?
A. nmap -sS
B. nmap -sT
C. nmap -vO
D. nmap -sO