John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
A. P0f
B. Superscan
C. Nmap
D. NBTscan
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?
A. Dynamic packet-filtering firewall
B. Application layer firewall
C. Proxy firewall
D. Circuit-level firewall
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures? (Choose two.)
A. Dsniff
B. KisMAC
C. Snort
D. Kismet
Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?
A. no service password-encryption
B. service password-encryption
C. enable password-encryption
D. no enable password-encryption
Which of the following libraries does TShark use to capture traffic from the first available network interface?
A. bcap
B. dcap
C. scap
D. pcap
Which of the following wireless security policies helps to prevent the wireless enabled laptops from peerto-peer attacks when the laptops are used in public access network? (Choose two.)
A. Use protocol analyzer
B. Use security protocols
C. Use firewall
D. Use Port Address Translation
Which of the following can provide security against man-in-the-middle attack?
A. Anti-virus programs
B. Strong data encryption during travel
C. Strong authentication method
D. Firewall
You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network.
Which of the following will be useful for accessing the server from outside the network?
A. Overloading
B. Switch
C. Static NAT
D. Dynamic VLAN
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?
A. Cipher Block Chaining (CBC) Mode
B. Electronic Codebook (ECB) Mode
C. Propagating Cipher Block Chaining (PCBC) Mode
D. Cipher Feedback (CFB) Mode
Which of the following number ranges is used for the IPX Standard ACL?
A. 1200-1299
B. 800-899
C. 1000-1099
D. 900-999