Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the rules that define the IDP policy in the rulebase.
Which of the following will he define as the components of the IDP policy rule?
Each correct answer represents a complete solution. (Choose all that apply.)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?
Which of the following fields is NOT included in packet fragmentation?
You work as a System Administrator for ABC Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing.
Which of the following commands will you use to test TCP/IP connectivity?
Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.
Which of the following tools will John use to accomplish his task?
Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network? (Choose two.)
You work as a Firewall Analyst in the ABC Inc. The company has a Linux-based environment. You have installed and configured netfilter/iptables on all computer systems.
What are the main features of netfilter/iptables?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following can be used in an extended access list to filter traffic?
Each correct answer represents a part of the solution. (Choose all that apply.)