You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following would be most helpful against Denial of Service (DOS) attacks?
Which of the following are the types of intrusion detection systems?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?
Adam works on a Linux system. He is using Sendmail as the primary application to transmit emails. Linux uses Syslog to maintain logs of what has occurred on the system.
Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?
Jain works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.abc.com.
He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the ABC server.
To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus.
Which of the following IDS evasion attacks is John performing?
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?
Which of the following devices are used to implement Network Address Translation (NAT)?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.
Which of the following tools will John use to accomplish his task?