Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?A . SnortB . NetStumblerC . AiroPeekD . CainView AnswerAnswer: B

November 17, 2019 No Comments READ MORE +

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?A . 2B . 0C . 1D . FView AnswerAnswer: C

November 16, 2019 No Comments READ MORE +

Which of the following well-known ports is used by BOOTP?

Which of the following well-known ports is used by BOOTP?A . UDP 67B . TCP 21C . UDP 69D . TCP 161View AnswerAnswer: A

November 16, 2019 No Comments READ MORE +

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?A . HoneynetB . Production honeypotC . Research honeypotD . HoneyfarmView AnswerAnswer: B

November 16, 2019 No Comments READ MORE +

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?A . The Data-Link layerB . The Physical layerC . The Network layerD . The Presentation layerView AnswerAnswer: C

November 16, 2019 No Comments READ MORE +

Which of the following is a version of netcat with integrated transport encryption capabilities?

Which of the following is a version of netcat with integrated transport encryption capabilities?A . EncatB . NiktoC . SocatD . CryptcatView AnswerAnswer: D

November 16, 2019 No Comments READ MORE +

Which of the following well-known ports is used by BOOTP?

Which of the following well-known ports is used by BOOTP?A . UDP 67B . TCP 21C . UDP 69D . TCP 161View AnswerAnswer: A

November 16, 2019 No Comments READ MORE +

On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?

The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter...

November 15, 2019 No Comments READ MORE +

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?A . Fragment offsetB . TTLC . Source addressD . Fragment IDView AnswerAnswer: A

November 15, 2019 No Comments READ MORE +

Which of the following well-known ports is used by BOOTP?

Which of the following well-known ports is used by BOOTP?A . UDP 67B . TCP 21C . UDP 69D . TCP 161View AnswerAnswer: A

November 15, 2019 No Comments READ MORE +