Which of the following steps will NOT make a server fault tolerant?
Which of the following steps will NOT make a server fault tolerant? Each correct answer
represents a complete solution. Choose two.
Which of the following help in estimating and totaling up the equivalent money value of the benefits and costs
Which of the following help in estimating and totaling up the equivalent money value of the
benefits and costs to the community of projects for establishing whether they are worthwhile?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the common security problems involved in communications and email?
Which of the following are the common security problems involved in communications and email?
Each correct answer represents a complete solution. Choose all that apply.
This tool is known as __________
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE
802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
It is commonly used for the following purposes:
a.War driving
b.Detecting unauthorized access points
c.Detecting causes of interference on a WLAN
d.WEP ICV error tracking
e.Making Graphs and Alarms on 802.11 Data, including Signal Strength
This tool is known as __________.
Which of the following are the six different phases of the Incident handling process?
Which of the following are the six different phases of the Incident handling process? Each correct
answer represents a complete solution. Choose all that apply.
Which of the following statements are true about an IPv6 network?
Which of the following statements are true about an IPv6 network? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following features is used to generate spam on the Internet by spammers and worms?
Which of the following features is used to generate spam on the Internet by spammers and
worms?
Which of the following tools is described below?
Which of the following tools is described below? It is a set of tools that are used for sniffing
passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice,
filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses
the arpredirect and macof tools for switching across switched networks. It can also be used to
capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP,
etc.
Which of the following IP class addresses are not allotted to hosts?
Which of the following IP class addresses are not allotted to hosts? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following tools can an attacker use to perform war dialing?
A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable
modems. It provides an attacker unauthorized access to a computer. Which of the following tools
can an attacker use to perform war dialing? Each correct answer represents a complete solution.
Choose all that apply.