You work as a Network Administrator in a company. The NIDS is implemented on the network.
You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?
Who are the primary victims of smurf attacks on the contemporary Internet system?
Which of the following utilities is used to display the current TCP/IP configuration of a Windows NT computer?
Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Linux file systems is a journaled file system?
Adam works as a Network Administrator for passguide Inc. He wants to prevent the network from
DOS attacks. Which of the following is most useful against DOS attacks?
Which of the following is used as a default port by the TELNET utility?
Which of the following is a valid IPv6 address?
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?
You work as a network administrator for Tech Perfect Inc. Rick, your assistant, requires information regarding his computer's IP address lease start date and expiry date. Which of the following commands will help him?
Which of the following is an example of penetration testing?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?
What is the order of the extension headers that is followed by IPv6?