Which of the following steps will NOT make a server fault tolerant?
Which of the following steps will NOT make a server fault tolerant? Each correct answer
represents a complete solution. Choose two.
This tool is known as __________
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE
802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
It is commonly used for the following purposes:
a.War driving
b.Detecting unauthorized access points
c.Detecting causes of interference on a WLAN
d.WEP ICV error tracking
e.Making Graphs and Alarms on 802.11 Data, including Signal Strength
This tool is known as __________.
Which of the following are the common security problems involved in communications and email?
Which of the following are the common security problems involved in communications and email?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the six different phases of the Incident handling process?
Which of the following are the six different phases of the Incident handling process? Each correct
answer represents a complete solution. Choose all that apply.
Which of the following statements are true about an IPv6 network?
Which of the following statements are true about an IPv6 network? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following features is used to generate spam on the Internet by spammers and worms?
Which of the following features is used to generate spam on the Internet by spammers and
worms?
Which of the following tools is described below?
Which of the following tools is described below? It is a set of tools that are used for sniffing
passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice,
filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses
the arpredirect and macof tools for switching across switched networks. It can also be used to
capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP,
etc.
Which of the following IP class addresses are not allotted to hosts?
Which of the following IP class addresses are not allotted to hosts? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following tools can an attacker use to perform war dialing?
A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable
modems. It provides an attacker unauthorized access to a computer. Which of the following tools
can an attacker use to perform war dialing? Each correct answer represents a complete solution.
Choose all that apply.
Which of the following protocols is used to share information between routers to transport IP Multicast packet
Which of the following protocols is used to share information between routers to transport IP
Multicast packets among networks?