DRAG DROP
John works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating system. He installs an application on his computer. The application is not running properly. Therefore, he wants to
disable the application.
What steps will he take to accomplish the task?
Select and Place:
DRAG DROP
A wireless network uses multiple modulation schemes to make the signal strong so that it can travel far. These modulation schemes work with a certain IEEE standard. Choose and drop the correct standards in the right pane according to the modulation scheme.
Select and Place:
DRAG DROP
You work as a Software Developer for UcTech Inc. You create a session object and want that it be destroyed if it is not called for 20 minutes.
Drag and drop the appropriate statements that you will use to accomplish the task.
Select and Place:
HOTSPOT
In the image of the Screened Host Firewall Architecture given below, select the element that is commonly known as the choke router.
Hot Area:
Which of the following statements about the traceroute utility are true?
A. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.
B. It records the time taken for a round trip for each packet at each router.
C. It is an online tool that performs polymorphic shell code attacks.
D. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.
Which of the following statements about session tracking is true?
A. When using cookies for session tracking, there is no restriction on the name of the session tracking cookie.
B. When using cookies for session tracking, the name of the session tracking cookie must be jsessionid.
C. A server cannot use cookie as the basis for session tracking.
D. A server cannot use URL rewriting as the basis for session tracking.
Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? (Choose two)
A. DNS cache poisoning
B. DDoS attack
C. IP spoofing attack
D. MAC spoofing
In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route.
What are the benefits of using a static route?
A. It is a fault tolerant path.
B. It reduces load on routers, as no complex routing calculations are required.
C. It reduces bandwidth usage, as there is no excessive router traffic.
D. It provides precise control over the routes that packets will take across the network.
What will be the output of the following command? echo $(date %M) > date.txt
A. The current time (Month) will be written in the date.txt file.
B. It will create a variable $(date %M).
C. It will print a string "date %M".
D. The current time (Minutes) will be written in the date.txt file.
You work as a Software Developer for UcTech Inc. You want to create a new session.
Which of the following methods can you use to accomplish the task?
A. getNewSession(true)
B. getSession(false)
C. getSession()
D. getSession(true)
E. getNewSession()