Which of the following sets of commands will you use to accomplish the task?

10.0.0/24 Which of the following sets of commands will you use to accomplish the task?A . access-list 10 permit 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-group 10 inB . access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny...

November 25, 2019 No Comments READ MORE +

Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to...

November 25, 2019 No Comments READ MORE +

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?A . SnortB . NetWitnessC . WiresharkD . NetresidentView AnswerAnswer: C

November 24, 2019 No Comments READ MORE +

Which of the following rulebases will he use to accomplish the task?

John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality. Which of...

November 23, 2019 No Comments READ MORE +

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?A . Corrective controlsB . Audit trailC . Detective controlsD . Security auditView AnswerAnswer: B

November 22, 2019 No Comments READ MORE +

Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?

Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?A . VLAN hopingB . ARP spoofingC . IP address spoofingD . MAC...

November 22, 2019 No Comments READ MORE +

What tool would you use to accomplish this?

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?A . Packet snifferB . Network mapperC . Protocol analyzerD . A port scannerView AnswerAnswer:...

November 22, 2019 No Comments READ MORE +

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?A . OverclockingB . Dynamic NATC . OverloadingD . Static NATView AnswerAnswer: C

November 22, 2019 No Comments READ MORE +

Which of the following commands will he use to accomplish the task?

Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step. Which of the following commands will he use to accomplish the task? Each correct...

November 22, 2019 No Comments READ MORE +

What will you do when you are required to see all traffic of the network?

Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic. What will you do when you are required to see all traffic of the network?A...

November 21, 2019 No Comments READ MORE +