The general form of the Cisco IOS is a.b.c.de.
Which of the following indicates the major version number of the Cisco IOS?
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel.
Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. (Choose all that apply.)
You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.
What tool would you use to accomplish this?
When client data is encapsulated into an LWAPP header, the wireless LAN controller improves the coverage areas.
Which information does the wireless LAN controller check?
Each correct answer represents a part of the solution. (Choose two.)
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.
Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration.
Which of the following ports will you have to open on the router to resolve the issue?
Which of the following fields are specified when rules are created for the Network Honeypot rulebase?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network.
Which of the following tools will you use?
You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones.
Which of the following commands will you use?
Which of the following describes the term inside global in NAT configuration?