Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem? A . Netfilter B . iptables C . WinPcap D . tcpdump
Which of the following firewalls operates at three layers – Layer3, Layer4, and Layer5? A . Dynamic packet-filtering firewall B . Application layer firewall C . Proxy firewall D . Circuit-level firewall
You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall.
Which of the following can be the reasons for your problems? Each correct answer represents a complete solution. (Choose all that apply.) A . It contains additional overhead of maintaining a state table. B . It has limited logging capabilities. C . It has to open up a large range of ports to allow communication. D . It is complex to configure.
He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully:
• Information gathering
• Determination of network range
• Identification of active systems
• Location of open ports and applications
Now, which of the following tasks should he perform next? A . Install a backdoor to log in remotely on the We-are-secure server. B . Map the network of We-are-secure Inc. C . Fingerprint the services running on the we-are-secure network. D . Perform OS fingerprinting on the We-are-secure network.
Which of the following are packet filtering tools for the Linux operating system? Each correct answer represents a complete solution. (Choose all that apply.) A . IPTables B . IPFilter C . Zone Alarm D . BlackICE
You work as a Network Administrator for ABC Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices.
What will you do? A . Implement a WIP C . Implement a dynamic NA E . Implement a firewall. F . Implement an AC
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.) A . Placing static ARP entries on servers and routes B . Using Private VLANs C . Using 8 digit passwords for authentication D . Looking for large amount of ARP traffic on local subnets