Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?
Which of the following protocols does IPsec use to perform various security functions in the network?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
Which of the following libraries does TShark use to capture traffic from the first available network interface?
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.
While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.
What is the cause of the issue?
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system.
Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?
Fill in the blank with the appropriate tool name.
__________ consists of flexible system architecture that provides a proper way for conducting industrial audits when it is required to identify unique positions of items.
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone.
Which of the following commands will you use to accomplish the task?
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo.
Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are in charge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data.
What type of threat is this?
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?
Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?
Which of the following types of firewall functions at the Session layer of Open System Interconnection (OSI) model?
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
You want to create a binary log file using tcpdump.
Which of the following commands will you use?
Fill in the blank with the appropriate utility.
________ is a table-based system or structure that defines the rulesets needed to transform or filter network packets.
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. (Choose two.)
Which of the following commands can change the IOS to be loaded in a router?
Which of the following applications cannot proactively detect anomalies related to a computer?
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?
Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?
A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network. The management wants to initiate a persistent connection with the managed devices until the block is removed.
Which of the following will you configure in the network to accomplish the task?
Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?
Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for He wants to find out the operating system of the ABC server in the information gathering step.
Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose two.)
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure security mechanisms for the network of the company. You have decided to configure a packet filtering firewall.
Which of the following may be the reasons that made you choose a packet filtering firewall as a security mechanism?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following statements about segmentation of a network using router is true?
Each correct answer represents a complete solution. (Choose three.)
Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?
Which of the following methods is a behavior-based IDS detection method?
Which of the following program loads IOS image into RAM?
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name.
What is the most likely cause?
Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?
Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?
Which of the following files is a Cisco IOS configuration file that resides in RAM?
Which of the following number ranges is used for the IP Standard ACL?
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.
Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. (Choose two.)
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?
Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network? (Choose two.)