Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?
A . Netfilter
B . iptables
C . WinPcap
D . tcpdump

Answer: D

Which of the following can be the reasons for your problems?

You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall.

Which of the following can be the reasons for your problems? Each correct answer represents a complete solution. (Choose all that apply.)
A . It contains additional overhead of maintaining a state table.
B . It has limited logging capabilities.
C . It has to open up a large range of ports to allow communication.
D . It is complex to configure.

Answer: A,D

Now, which of the following tasks should he perform next?

Jain works as a professional Ethical Hacker.

He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully:

• Information gathering

• Determination of network range

• Identification of active systems

• Location of open ports and applications

Now, which of the following tasks should he perform next?
A . Install a backdoor to log in remotely on the We-are-secure server.
B . Map the network of We-are-secure Inc.
C . Fingerprint the services running on the we-are-secure network.
D . Perform OS fingerprinting on the We-are-secure network.

Answer: D

What will you do?

You work as a Network Administrator for ABC Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices.

What will you do?
A . Implement a WIP
C . Implement a dynamic NA
E . Implement a firewall.
F . Implement an AC

Answer: A

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)
A . Placing static ARP entries on servers and routes
B . Using Private VLANs
C . Using 8 digit passwords for authentication
D . Looking for large amount of ARP traffic on local subnets

Answer: A,B,D