Which of the following is the default port for Simple Network Management Protocol (SNMP)?
A. TCP port 110
B. TCP port 25
C. TCP port 80
D. UDP port 161
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?
A. Reinstall TCP/IP protocol.
B. Check that the correct default gateway is set.
C. Enable DNS.
D. Ensure that NetBEUI protocol is loaded.
E. Use the NETSTAT utility to view TCP/IP statistics.
Which of the following commands will you use to display ARP packets in the snort-output?
A. snort -v -i eth 0
B. snort -d -v -i eth 0
C. snort -dev -i eth 0
D. snort -deva -i eth 0
Which of the following is a reason to implement security logging on a DNS server?
A. For recording the number of queries resolved
B. For preventing malware attacks on a DNS server
C. For measuring a DNS server's performance
D. For monitoring unauthorized zone transfer
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system. Which
of the following sources will Adam investigate on a Windows host to collect the electronic evidences?
Each correct answer represents a complete solution. Choose all that apply.
A. Allocated cluster
B. Swap files
C. Slack spaces
D. Unused and hidden partition
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker? Each correct answer represents a complete solution. Choose all that apply.
A. portsentry
B. libnids
C. nmap
D. scanlogd
The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?
A. Spoofing
B. Sending deceptive e-mails
C. Network Configuration Changes
D. Shunning
E. Logging
F. Sending notifications
Which of the following image file formats uses a lossy data compression technique?
A. GIF
B. JPG
C. PNG
D. TIF
What is the maximum size of an IP datagram for Ethernet?
A. 4500 bytes
B. 1024 bytes
C. 1200 bytes
D. 1500 bytes
Which of the following TCP/UDP port is used by the toolkit program netstat?
A. Port 23
B. Port 15
C. Port 7
D. Port 69