Which of the following are pre-requisites for an attacker to conduct firewalking?
Firewalking is a technique that can be used to gather information about a remote network
protected by a firewall. This technique can be used effectively to perform information gathering
attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire
one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct
firewalking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following security protocols are based on the 802.11i standard?
Which of the following security protocols are based on the 802.11i standard?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data
Which of the following OSI layers is responsible for protocol conversion, data
encryption/decryption, and data compression?
What method would be best for finding such flaws?
You are responsible for security at a company that uses a lot of Web applications. You are most
concerned about flaws in those applications allowing some attacker to get into your network. What
method would be best for finding such flaws?
Which of the following representatives of incident response team takes forensic backups of the systems that ar
Which of the following representatives of incident response team takes forensic backups of the
systems that are the focus of the incident?
Which of the following statements are true about routers?
Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of attacks cannot be prevented by technical measures only?
Which of the following types of attacks cannot be prevented by technical measures only?
which of the following is NOT necessary?
You work as a Network Administrator for Tech Perfect Inc. The company requires a secure
wireless
network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring
ISA Server 2006, which of the following is NOT necessary?
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements best describes a certification authority?
Which of the following statements best describes a certification authority?