Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. (Choose three.)
A. Analyze
B. Acquire
C. Authenticate
D. Encrypt
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open
connections simultaneously so that all hosts behind it are effectively disabled.
Which of the following attacks is John performing?
A. Replay attack
B. ARP spoofing
C. DoS attack
D. Rainbow attack
A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.
Which technology is used to allow a pool of users to share one global IP address for Internet access?
A. Port Address Translation
B. Private Address Translation
C. Per-user Address Translation
D. Pool Address Translation
You work as a Network Architect for ABC Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:
>> Provide security for the web traffic.
>> Browser clients can support the VPN connection to a host.
Which of the following will you configure to implement the given features in the network?
A. DACL
B. SSL
C. SSH
D. IPsec
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
A. Signature-based IDS
B. Passive IDS
C. Network-based IDS
D. Active IDS
You are implementing passive OS fingerprinting in a network.
Which of the following aspects are required to be configured there?
Each correct answer represents a part of the solution. (Choose all that apply.)
A. Edit signature vulnerable OS lists.
B. Enable passive analysis.
C. Define and import OS mappings.
D. Define event action rules filters using the OS relevancy value of the target.
E. Limit the attack relevance rating calculation to a specific IP address range.
You are configuring a public access wireless connection.
Which of the following is the best way to secure this connection?
A. Not broadcasting SSID
B. Implementing anti-virus
C. Using MAC filtering
D. Using WPA encryption
On which of the following interfaces of the router is the clock rate command used?
A. DCE
B. ETHERNET
C. DTE
D. VIRTUAL LINE VTY
Which of the following can be used to mitigate the evil twin phishing attack?
A. Obiwan
B. Magic Lantern
C. SARA
D. IPSec VPN
Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events.
NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?
A. NIDS
B. HIDS
C. HIPS
D. NIPS