Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
C
You are implementing a host based intrusion detection system on your web server. You feel that the
best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and
to monitor for conditions above that baseline.
This type of IDS is called __________.
C
Which of the following are open-source vulnerability scanners? (Choose three.)
A,B,C
Suppose you are working as a Security Administrator at ABC Inc. The company has a switched
network. You have configured tcpdump in the network which can only see traffic addressed to itself
and broadcast traffic.
What will you do when you are required to see all traffic of the network?
A
Which of the following techniques is used to identify attacks originating from a botnet?
D
John works as a professional Ethical Hacker. He is assigned a project to test the security of
www.abc.com
. You have searched all open ports of the ABC server. Now, you want to perform the
next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
A
Which of the following protocols is used by TFTP as a file transfer protocol?
B
Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. (Choose three.)
A,B,C
Which of the following monitors program activities and modifies malicious activities on a system?
A
Which of the following wireless security features provides the best wireless security mechanism?
C
David works as the Security Manager for ABC Inc. He has been assigned a project to detect the
attacks over multiple connections and sessions and to count the number of scanned ports in a
defined time period.
Which of the following rulebases will he use to accomplish the task?
C
Which of the following terms is used to represent IPv6 addresses?
D
You work as a Security Administrator for ABC Inc. You have implemented and configured a web
application security scanner in the company's network. It helps in the automated review of the web
applications with the defined purpose of discovering security vulnerabilities. In order to perform this
task, the web application security scanner examines a number of vulnerabilities.
What are these vulnerabilities?
Each correct answer represents a complete solution. (Choose three.)
A,C,D
Which of the following information must the fragments carry for the destination host to reassemble
them back to the original unfragmented state?
Each correct answer represents a complete solution. (Choose all that apply.)
A,B,C,D
Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)
B,C,D