Which technical characteristic do Ethereal/Wireshark, T…
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
Which of the following tools will decode a packet captu…
Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode
a packet capture and extract the voice conversations?
which of the following is occurring?
From the two screenshots below, which of the following is occurring?
First one:
1 [10.0.0.253]# nmap -sP 10.0.0.0/24
2
3 Starting Nmap
5 Host 10.0.0.1 appears to be up.
6 MAC Address: 00:09:5B:29:FD:96 (Netgear)
7 Host 10.0.0.2 appears to be up.
8 MAC Address: 00:0F:B5:96:38:5D (Netgear)
9 Host 10.0.0.4 appears to be up.
10 Host 10.0.0.5 appears to be up.
11 MAC Address: 00:14:2A:B1:1E:2E (Elitegroup Computer System Co.)
12 Nmap finished: 256 IP addresses (4 hosts up) scanned in 5.399 seconds
Second one:
1 [10.0.0.252]# nmap -sO 10.0.0.2
2
3 Starting Nmap 4.01 at 2006-07-14 12:56 BST
4 Interesting protocols on 10.0.0.2:
5 (The 251 protocols scanned but not shown below are
6 in state: closed)
7 PROTOCOL STATE SERVICE
8 1 open icmp
9 2 open|filtered igmp
10 6 open tcp
11 17 open udp
12 255 open|filtered unknown
13
14 Nmap finished: 1 IP address (1 host up) scanned in
15 1.259 seconds
Which of the following is the most likely reason for la…
An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did
not contain management or control packets in the submitted traces. Which of the following is the most likely
reason for lack of management or control packets?
Which type of intrusion detection system can monitor an…
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
which of the following?
When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?
Which type of certificate is used to encrypt and decryp…
The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing
is a concern because credit card information will be sent electronically over the Internet. Customers visiting the
site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
What is the main advantage that a network-based IDS/IPS…
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
which of the following vulnerabilities?
The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the
following vulnerabilities?
Which of the following conditions must be met to exploi…
During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site
Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?