Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
Which of the following is not a Denial of Service (DoS) attack?
In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?
What is the process of detecting unauthorized access known as?
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Which of the following ports is used for DNS services?
Which of the following is NOT an Intrusion Detection System?
Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?
Which of the following methods is a behavior-based IDS detection method?
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
How many bits does IPv6 use in IP addresses?