PrepAway - Latest Free Exam Questions & Answers

Tag: Exam ECSS

Which of the following worms has attacked the computer?

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based
network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the
company complains to John that his system contains an unknown package named as tar.gz and
his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about
the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that
the other computers on the network are also facing the same problem. John discovers that a
malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?

Which of the following actions will you perform to accomplish the task?

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server
2008 network environment. The network is configured as a Windows Active Directory-based single
forest domain-based network. The company has recently provided fifty laptops to its sales team
members. You are required to configure an 802.11 wireless network for the laptops. The sales
team members must be able to use their data placed at a server in a cabled network. The planned
network should be able to handle the threat of unauthorized access and data interception by an
unauthorized user. You are also required to prevent the sales team members from communicating
directly to one another. Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.


Page 6 of 28« First...45678...20...Last »