Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
Which of the following can be used in an extended access list to filter traffic?
Each correct answer represents a part of the solution. (Choose all that apply.)
John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication.
Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?
Which of the following is a version of netcat with integrated transport encryption capabilities?
You are tasked with configuring your routers with a minimum security standard that includes the following:
• A local Username and Password configured on the router
• A strong privilege mode password
• Encryption of user passwords
• Configuring telnet and ssh to authenticate against the router user database
Choose the configuration that meets these requirements best.
Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?
Each correct answer represents a part of the solution. (Choose three.)
Which of the following statements are true about the Network Honeypot a rulebase?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following files is a Cisco IOS configuration file that resides in RAM?
Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack.
What can he do to accomplish this?
Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?
Each correct answer represents a complete solution. (Choose all that apply.)