SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?
Identify whether the given statement is true or false.
"Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords."
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols implements VPN using IPSec?
How many keys are used to encrypt data in symmetric encryption?
Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about smurf is true?
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Which of the following statements about symmetric encryption are true?
Each correct answer represents a complete solution. Choose three.
Which of the following tools is NOT used for logging network activities in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?